Sciweavers

2195 search results - page 400 / 439
» Prototyping Networked Embedded Systems
Sort
View
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
15 years 7 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
132
Voted
CLUSTER
2004
IEEE
15 years 6 months ago
JuxtaView - a tool for interactive visualization of large imagery on scalable tiled displays
JuxtaView is a cluster-based application for viewing ultra-high-resolution images on scalable tiled displays. We present in JuxtaView, a new parallel computing and distributed mem...
Naveen K. Krishnaprasad, Venkatram Vishwanath, Sha...
FORMATS
2006
Springer
15 years 6 months ago
Adding Invariants to Event Zone Automata
Recently, a new approach to the symbolic model checking of timed automata based on a partial order semantics was introduced, which relies on event zones that use vectors of event o...
Peter Niebert, Hongyang Qu
ESWA
2006
243views more  ESWA 2006»
15 years 2 months ago
Knowledge based crime scenario modelling
A crucial concern in the evaluation of evidence related to a major crime is the formulation of sufficient alternative plausible scenarios that can explain the available evidence. ...
Jeroen Keppens, Burkhard Schafer
100
Voted
CCR
2007
108views more  CCR 2007»
15 years 2 months ago
Very low-cost internet access using KioskNet
Rural Internet kiosks in developing regions can cost-effectively provide communication and e-governance services to the poorest sections of society. A variety of technical and no...
Shimin Guo, Mohammad Hossein Falaki, Earl A. Olive...