Sciweavers

3771 search results - page 632 / 755
» Subobject Transformation Systems
Sort
View
FPL
2005
Springer
98views Hardware» more  FPL 2005»
15 years 9 months ago
Using DSP Blocks For ROM Replacement: A Novel Synthesis Flow
This paper describes a method based on polynomial approximation for transferring ROM resources used in FPGA designs to multiplication and addition operations. The technique can be...
Gareth W. Morris, George A. Constantinides, Peter ...
131
Voted
ICIAR
2005
Springer
15 years 9 months ago
Scalable e-Learning Multimedia Adaptation Architecture
A neglected challenge in existing e-Learning (eL) systems is providing access to multimedia to all users regardless of environmental conditions such as diverse device capabilities,...
Mazen Almaoui, Konstantinos N. Plataniotis
127
Voted
ICLP
2005
Springer
15 years 9 months ago
Nondeterminism Analysis of Functional Logic Programs
Abstract. Information about the nondeterminism behavior of a functional logic program is important for various reasons. For instance, a nondeterministic choice in I/O operations re...
Bernd Braßel, Michael Hanus
IH
2005
Springer
15 years 9 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
133
Voted
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 9 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng