Sciweavers

1366 search results - page 123 / 274
» Modularizing Contexted Constraints
Sort
View
CHES
2003
Springer
149views Cryptology» more  CHES 2003»
15 years 4 months ago
Attacking Unbalanced RSA-CRT Using SPA
Abstract. Efficient implementations of RSA on computationally limited devices, such as smartcards, often use the CRT technique in combination with Garner’s algorithm in order to ...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
SIGSOFT
2000
ACM
15 years 3 months ago
Extracting library-based object-oriented applications
In an increasingly popular model of software distribution, software is developed in one computing environment and deployed in other environments by transfer over the internet. Ext...
Peter F. Sweeney, Frank Tip
ISORC
1999
IEEE
15 years 3 months ago
Implementing the Real-Time Publisher/Subscriber Model on the Controller Area Network (CAN)
Designing distributed real-time systems as being composed of communicating objects offers many advantages with respect to modularity and extensibility of these systems. However, d...
Jörg Kaiser, Michael Mock
ICSE
1999
IEEE-ACM
15 years 3 months ago
Using Off-the-Shelf Middleware to Implement Connectors in Distributed Software Architectures
Software architectures promote development focused on modular building blocks and their interconnections. Since architecture-level components often contain complex functionality, ...
Eric M. Dashofy, Nenad Medvidovic, Richard N. Tayl...
HICSS
1998
IEEE
176views Biometrics» more  HICSS 1998»
15 years 3 months ago
Intelligent System for Reading Handwriting on Forms
The National Institute of Standards and Technology (NIST) has developed a form-based handprint recognition system for reading information written on forms. This public domain soft...
Michael D. Garris