Sciweavers

4421 search results - page 432 / 885
» Libraries
Sort
View
ISCAS
2006
IEEE
163views Hardware» more  ISCAS 2006»
15 years 10 months ago
ASIC hardware implementation of the IDEA NXT encryption algorithm
— Symmetric-key block ciphers are often used to provide data confidentiality with low complexity, especially in the case of dedicated hardware implementations. IDEA NXT is a nov...
Marco Macchetti, Wenyu Chen
LAWEB
2006
IEEE
15 years 10 months ago
Preserving the Scholarly Side of the Web
This paper presents results of a case study that addresses many issues surrounding the difficult task of preservation in a digital library. We focus on a subset of these issues as...
Adam Mikeal, Cody Green, Alexey Maslov, Scott Phil...
142
Voted
NCA
2006
IEEE
15 years 10 months ago
A Flexible Replication Mechanism with Extended Database Connection Layers
It is vital to achieve a disaster recovery system that allows a backup site to take over a primary site’s IT services while the primary site is down. We propose a flexible repli...
Nobutatsu Nakamura, Ken-ichiro Fujiyama, Eiji Kawa...
130
Voted
SIBGRAPI
2006
IEEE
15 years 10 months ago
Plausible Image Based Soft Shadows Using Occlusion Textures
This paper presents a novel image-based approach to render plausible soft shadows for complex dynamic scenes with rectangular light sources. The algorithm's performance is mo...
Elmar Eisemann, Xavier Décoret
WCRE
2006
IEEE
15 years 10 months ago
How Programs Represent Reality (and how they don't)
Programming is modeling the reality. Most of the times, the mapping between source code and the real world concepts is captured implicitly in the names of identifiers. Making the...
Daniel Ratiu, Florian Deissenboeck