Sciweavers

631 search results - page 90 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
FPGA
2004
ACM
136views FPGA» more  FPGA 2004»
15 years 7 months ago
Active leakage power optimization for FPGAs
We consider active leakage power dissipation in FPGAs and present a “no cost” approach for active leakage reduction. It is well-known that the leakage power consumed by a digi...
Jason Helge Anderson, Farid N. Najm, Tim Tuan
VLDB
2004
ACM
105views Database» more  VLDB 2004»
15 years 7 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
CGO
2003
IEEE
15 years 6 months ago
Code Optimization for Code Compression
With the emergence of software delivery platforms such as Microsoft’s .NET, reduced size of transmitted binaries has become a very important system parameter strongly affecting ...
Milenko Drinic, Darko Kirovski, Hoi Vo
HICSS
2003
IEEE
116views Biometrics» more  HICSS 2003»
15 years 6 months ago
XML Based Robust Client-Server Communication for a Distributed Telecommunication Management System
Our Distributed Telecommunication Management System (DTMS) uses an object-oriented model to describe the networked Voice Communication System (VCS) to be managed. In order to allo...
Karl M. Göschka, Helmut Reis, Robert Smeikal
ICCS
2003
Springer
15 years 6 months ago
Mantle Convection Modeling with Viscoelastic/Brittle Lithosphere: Numerical and Computational Methodology
The Earth’s tectonic plates are strong, viscoelastic shells which make up the outermost part of a thermally convecting, predominantly viscous layer; at the boundaries between pla...
Louis Moresi, David May, Justin Freeman, Bill F. A...