Sciweavers

817 search results - page 117 / 164
» On 2-factors with k components
Sort
View
ICSM
1997
IEEE
15 years 2 months ago
MORALE. Mission ORiented Architectural Legacy Evolution
Software evolution is the most costly and time consuming software development activity. Yet software engineering research is predominantly concerned with initial development. MORA...
Gregory D. Abowd, Ashok K. Goel, Dean F. Jerding, ...
ICCAD
1996
IEEE
140views Hardware» more  ICCAD 1996»
15 years 1 months ago
Register-transfer level estimation techniques for switching activity and power consumption
We present techniques for estimating switching activity and power consumption in register-transfer level (RTL) circuits. Previous work on this topic has ignored the presence of gl...
Anand Raghunathan, Sujit Dey, Niraj K. Jha
MM
1996
ACM
150views Multimedia» more  MM 1996»
15 years 1 months ago
Adaptive Rate-Controlled Scheduling for Multimedia Applications
We present a framework for integrated scheduling of continuous media (CM) and other applications. The framework, called ARC scheduling, consists of a rate-controlled on-line CPU sc...
David K. Y. Yau, Simon S. Lam
AOSD
2007
ACM
15 years 1 months ago
Evolving embedded product lines: opportunities for aspects
The traditional constraints on software development and architectures in the consumer electronics domain, including the low cost of manufacturing of a product, support for familie...
Aleksandra Tesanovic
ASIACRYPT
2007
Springer
15 years 1 months ago
On Efficient Message Authentication Via Block Cipher Design Techniques
In an effort to design a MAC scheme that is built using block cipher components and runs faster than the modes of operation for message authentication, Daemen and Rijmen have propo...
Goce Jakimoski, K. P. Subbalakshmi