Sciweavers

826 search results - page 163 / 166
» Software Reuse: Research and Practice
Sort
View
FM
2006
Springer
172views Formal Methods» more  FM 2006»
15 years 1 months ago
The Embedded Systems Design Challenge
We summarize some current trends in embedded systems design and point out some of their characteristics, such as the chasm between analytical and computational models, and the gap ...
Thomas A. Henzinger, Joseph Sifakis
CHES
2008
Springer
134views Cryptology» more  CHES 2008»
14 years 11 months ago
Ultra High Performance ECC over NIST Primes on Commercial FPGAs
Elliptic Curve Cryptosystems (ECC) have gained increasing acceptance in practice due to their significantly smaller bit size of the operands compared to other public-key cryptosyst...
Tim Güneysu, Christof Paar
ATAL
2006
Springer
14 years 11 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate
ACE
2004
186views Education» more  ACE 2004»
14 years 11 months ago
TinkerNet: A Low-Cost Networking Laboratory
The 2002 SIGCOMM Workshop on Educational Challenges for Computer Networking [Kur02a] exposed many issues related to teaching computer networking with the need for a laboratory in ...
Michael Erlinger, Mart Molle, Titus Winters, Chris...
CARS
2004
14 years 11 months ago
Robotically assisted ablative treatment guided by freehand 3D ultrasound
Robots can improve the accuracy of image-guided needle placement over traditional free-hand techniques. While many research groups have demonstrated this, widespread clinical adopt...
Emad Boctor, Robert J. Webster III, Michael A. Cho...