Sciweavers

4498 search results - page 626 / 900
» How to Invent Functions
Sort
View
ICCBSS
2005
Springer
15 years 10 months ago
Specifying Interaction Constraints of Software Components for Better Understandability and Interoperability
A vital issue in the correct use of commercial-off-the-shelf (COTS) components is the proper understanding of their functionality, quality attributes and ways of operation. Traditi...
Yan Jin, Jun Han
ICN
2005
Springer
15 years 10 months ago
Failover for Mobile Routers: A Vision of Resilient Ambience
The ambient networking approach includes the flexibility of every end system to be not just a node but also an entire network. The end user entities are, in the majority of use cas...
Eranga Perera, Aruna Seneviratne, Roksana Boreli, ...
LCTRTS
2005
Springer
15 years 10 months ago
Generation of permutations for SIMD processors
Short vector (SIMD) instructions are useful in signal processing, multimedia, and scientific applications. They offer higher performance, lower energy consumption, and better res...
Alexei Kudriavtsev, Peter M. Kogge
NOSSDAV
2005
Springer
15 years 10 months ago
The case for multi-tier camera sensor networks
In this position paper, we examine recent technology trends that have resulted in a broad spectrum of camera sensors, wireless radio technologies, and embedded sensor platforms wi...
Purushottam Kulkarni, Deepak Ganesan, Prashant J. ...
PKC
2005
Springer
110views Cryptology» more  PKC 2005»
15 years 10 months ago
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited
To sign with RSA, one usually encodes the message m as µ(m) and then raises the result to the private exponent modulo N. In Asiacrypt 2000, Coron et al. showed how to build a secu...
Julien Cathalo, Jean-Sébastien Coron, David...