Sciweavers

4498 search results - page 664 / 900
» How to Invent Functions
Sort
View
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
15 years 8 months ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont
ECLIPSE
2004
ACM
15 years 8 months ago
Teaching object-oriented concepts with Eclipse
Object-oriented software development is a subject area difficult to teach, especially to beginners. They face a lot of abstraction and (from a beginners point of view) isolated to...
Matthias Meyer, Lothar Wendehals
DAMON
2006
Springer
15 years 8 months ago
Architecture-conscious hashing
Hashing is one of the fundamental techniques used to implement query processing operators such as grouping, aggregation and join. This paper studies the interaction between modern...
Marcin Zukowski, Sándor Héman, Peter...
E4MAS
2006
Springer
15 years 8 months ago
A Reference Architecture for Situated Multiagent Systems
Abstract. A reference architecture integrates a set of architectural patterns that have proven their value for a family of applications. Such family of applications is characterize...
Danny Weyns, Tom Holvoet
ECAI
2006
Springer
15 years 8 months ago
Coalition Structure Generation in Task-Based Settings
The coalition formation process, in which a number of independent, autonomous agents come together to act as a collective, is an important form of interaction in multi-agent system...
Viet Dung Dang, Nicholas R. Jennings