Sciweavers

2978 search results - page 467 / 596
» Operations Research
Sort
View
FC
1997
Springer
86views Cryptology» more  FC 1997»
15 years 7 months ago
The SPEED Cipher
Abstract. SPEED is a private key block cipher. It supports three variable parameters: (1) data length — the length of a plaintext/ciphertext of SPEED can be 64, 128 or 256 bits. ...
Yuliang Zheng
IPPS
2006
IEEE
15 years 9 months ago
Techniques and tools for dynamic optimization
Traditional code optimizers have produced significant performance improvements over the past forty years. While promising avenues of research still exist, traditional static and p...
Jason Hiser, Naveen Kumar, Min Zhao, Shukang Zhou,...
HICSS
1996
IEEE
94views Biometrics» more  HICSS 1996»
15 years 7 months ago
TREAT: Promoting SME Adoption of EDI through Education
Electronic Data Interchange (EDI), an example of an Inter-Organisational System (IOS), has the potential to provide companies with tangible benefits, such as improvements to overa...
Craig M. Parker, Paula M. C. Swatman
139
Voted
JSAC
2006
130views more  JSAC 2006»
15 years 3 months ago
Performance Preserving Topological Downscaling of Internet-Like Networks
Abstract--The Internet is a large, heterogeneous system operating at very high speeds and consisting of a large number of users. Researchers use a suite of tools and techniques in ...
Fragkiskos Papadopoulos, Konstantinos Psounis, Ram...
DAC
2008
ACM
16 years 4 months ago
Automated hardware-independent scenario identification
Scenario-based design exploits the time-varying execution behavior of applications by dynamically adapting the system on which they run. This is a particularly interesting design ...
Juan Hamers, Lieven Eeckhout