Sciweavers

402 search results - page 31 / 81
» Practical Application of Existing Hypermedia Standards and T...
Sort
View
CHES
2010
Springer
141views Cryptology» more  CHES 2010»
15 years 13 days ago
Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
Performance in hardware has been demonstrated to be an important factor in the evaluation of candidates for cryptographic standards. Up to now, no consensus exists on how such an e...
Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski
WSCG
2001
114views more  WSCG 2001»
15 years 21 days ago
Interactive Data Exploration with Customized Glyphs
We present a visualization system allowing non-programmers to visualize, explore, and analyze unknown multivariate data by designing an appropriate glyph representation with minim...
Martin Kraus, Thomas Ertl
SAS
2007
Springer
15 years 5 months ago
Refactoring Using Type Constraints
Type constraints express subtype-relationships between the types of program expressions that are required for type-correctness, and were originally proposed as a convenient framewo...
Frank Tip
SCAM
2005
IEEE
15 years 4 months ago
Pointer Analysis for Source-to-Source Transformations
We present a pointer analysis algorithm designed for source-to-source transformations. Existing techniques for pointer analysis apply a collection of inference rules to a dismantl...
Marcio Buss, Stephen A. Edwards, Bin Yao, Dan G. W...
VLDB
1998
ACM
103views Database» more  VLDB 1998»
15 years 3 months ago
The Drill Down Benchmark
Data Mining places specific requirements on DBMS query performance that cannot be evaluated satisfactorily using existing OLAP benchmarks. The DD Benchmark - defined here - provid...
Peter A. Boncz, Tim Rühl, Fred Kwakkel