Sciweavers

4895 search results - page 955 / 979
» Tools for Grammar Engineering
Sort
View
FSTTCS
2003
Springer
15 years 2 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
74
Voted
MICRO
2002
IEEE
97views Hardware» more  MICRO 2002»
15 years 2 months ago
Three extensions to register integration
Register integration (or just integration) is a register renaming discipline that implements instruction reuse via physical register sharing. Initially developed to perform squash...
Vlad Petric, Anne Bracy, Amir Roth
85
Voted
SBCCI
2009
ACM
187views VLSI» more  SBCCI 2009»
15 years 2 months ago
Design of low complexity digital FIR filters
The multiplication of a variable by multiple constants, i.e., the multiple constant multiplications (MCM), has been a central operation and performance bottleneck in many applicat...
Levent Aksoy, Diego Jaccottet, Eduardo Costa
86
Voted
ICNP
2000
IEEE
15 years 2 months ago
Differentiated Predictive Fair Service for TCP Flows
The majority of the traffic (bytes) flowing over the Internet today have been attributed to the Transmission Control Protocol (TCP). This strong presence of TCP has recently spu...
Ibrahim Matta, Liang Guo
88
Voted
ACMDIS
2000
ACM
15 years 2 months ago
Contextual Prototyping of User Interfaces
Contextual development differs from traditional user interface development in several ways: It focuses on the context of usage and the user population rather than on the technical...
Christian Stary