Sciweavers

6978 search results - page 185 / 1396
» Reframing Requirements Analysis
Sort
View
ACISP
2007
Springer
15 years 11 months ago
An Analysis of the Hermes8 Stream Ciphers
Hermes8 [6,7] is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM [3]). In this paper we present an analysis of the Hermes8 stream ciphers. In parti...
Steve Babbage, Carlos Cid, Norbert Pramstaller, H&...
PRIMA
2007
Springer
15 years 11 months ago
Analysis of Pedestrian Navigation Using Cellular Phones
Navigation services for pedestrians are spreading in recent years. Our approach to provide personal navigation is to build a multiagent system that assigns one guiding agent to eac...
Yuu Nakajima, Takatoshi Oishi, Toru Ishida, Daisuk...
ICMCS
2006
IEEE
142views Multimedia» more  ICMCS 2006»
15 years 11 months ago
Complexity Analysis of H.264 Decoder for FPGA Design
— A major challenge in the design of any real time system is the proper selection of implementation and platform alternatives. In this paper, a suitable FPGA-based design of the ...
Tuomas Lindroth, Nastooh Avessta, Jukka Teuhola, T...
IPPS
2006
IEEE
15 years 11 months ago
Design and analysis of matching circuit architectures for a closest match lookup
— This paper investigates the implementation of a number of circuits used to perform a high speed closest value match lookup. The design is targeted particularly for use in a sea...
Kieran McLaughlin, Friederich Kupzog, Holger Blume...
IPPS
2006
IEEE
15 years 11 months ago
An advanced performance analysis of self-stabilizing protocols: stabilization time with transient faults during convergence
A self-stabilizing protocol is a brilliant framework for fault tolerance. It can recover from any number and any type of transient faults and eventually converge to its intended b...
Yoshihiro Nakaminami, Hirotsugu Kakugawa, Toshimit...