Sciweavers

6978 search results - page 185 / 1396
» Reframing Requirements Analysis
Sort
View
ACISP
2007
Springer
15 years 4 months ago
An Analysis of the Hermes8 Stream Ciphers
Hermes8 [6,7] is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM [3]). In this paper we present an analysis of the Hermes8 stream ciphers. In parti...
Steve Babbage, Carlos Cid, Norbert Pramstaller, H&...
105
Voted
PRIMA
2007
Springer
15 years 4 months ago
Analysis of Pedestrian Navigation Using Cellular Phones
Navigation services for pedestrians are spreading in recent years. Our approach to provide personal navigation is to build a multiagent system that assigns one guiding agent to eac...
Yuu Nakajima, Takatoshi Oishi, Toru Ishida, Daisuk...
ICMCS
2006
IEEE
142views Multimedia» more  ICMCS 2006»
15 years 4 months ago
Complexity Analysis of H.264 Decoder for FPGA Design
— A major challenge in the design of any real time system is the proper selection of implementation and platform alternatives. In this paper, a suitable FPGA-based design of the ...
Tuomas Lindroth, Nastooh Avessta, Jukka Teuhola, T...
IPPS
2006
IEEE
15 years 4 months ago
Design and analysis of matching circuit architectures for a closest match lookup
— This paper investigates the implementation of a number of circuits used to perform a high speed closest value match lookup. The design is targeted particularly for use in a sea...
Kieran McLaughlin, Friederich Kupzog, Holger Blume...
IPPS
2006
IEEE
15 years 4 months ago
An advanced performance analysis of self-stabilizing protocols: stabilization time with transient faults during convergence
A self-stabilizing protocol is a brilliant framework for fault tolerance. It can recover from any number and any type of transient faults and eventually converge to its intended b...
Yoshihiro Nakaminami, Hirotsugu Kakugawa, Toshimit...