Sciweavers

1282 search results - page 125 / 257
» Practical Loss-Resilient Codes
Sort
View
99
Voted
ASM
2004
ASM
15 years 6 months ago
The Cryptographic Abstract Machine
tographic Abstract Machine Dean Rosenzweig and Davor Runje University of Zagreb The Cryptographic Abstract Machine is an executional model of cryptographic actions, independent of ...
Dean Rosenzweig, Davor Runje
109
Voted
GI
2004
Springer
15 years 6 months ago
Open Source As a Knowledge Management Instrument
: Knowledge management typically focuses on communicating and spreading information and knowledge within a company. It is usually limited to technology or business information in s...
Thomas Wieland
FM
2003
Springer
107views Formal Methods» more  FM 2003»
15 years 6 months ago
Verifying Emulation of Legacy Mission Computer Systems
Processor obsolescence is a serious maintenance problem for long-lived embedded control systems. A practical solution is to interpose an emulator program between the ‘legacy’ s...
Colin J. Fidge
ICIAP
1999
ACM
15 years 5 months ago
Cellular Automata Based Optical Flow Computation for "Just-in-Time" Applications
Real-world tasks often require real-time performances. However, in many practical cases, “just in time” responses are sufficient. This means that a system should be efficien...
Giovanni Adorni, Stefano Cagnoni, Monica Mordonini
108
Voted
LCN
1998
IEEE
15 years 5 months ago
Multicasting Multimedia Streams with Active Networks
Active networks allow code to be loaded dynamically into network nodes at run-time. This code can perform tasks specific to a stream of packets or even a single packet. In this pa...
Albert Banchs, Wolfgang Effelsberg, Christian F. T...