Sciweavers

785 search results - page 139 / 157
» Using Multiple Levels of Abstractions in Embedded Software D...
Sort
View
INDOCRYPT
2004
Springer
15 years 3 months ago
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
Abstract. The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on mul...
David A. McGrew, John Viega
CASES
2006
ACM
15 years 3 months ago
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations
Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Mark Hempstead, Gu-Yeon Wei, David Brooks
70
Voted
MABS
2004
Springer
15 years 3 months ago
Extending Time Management Support for Multi-agent Systems
Time management is essential when simulating multi-agent systems (MASs) as it allows consistent and repeatable simulation runs. So far, time management lacks support to express the...
Alexander Helleboogh, Tom Holvoet, Danny Weyns, Yo...
80
Voted
ECMDAFA
2010
Springer
151views Hardware» more  ECMDAFA 2010»
15 years 28 days ago
Generative Technologies for Model Animation in the TopCased Platform
Domain Specific Modeling Languages (DSML) are more and more used to handle high level concepts, and thus bring complex software development under control. The increasingly recurrin...
Xavier Crégut, Benoît Combemale, Marc...
SIGCOMM
2009
ACM
15 years 4 months ago
GrassRoots: socially-driven web sites for the masses
Large, socially-driven Web 2.0 sites such as Facebook and Youtube have seen significant growth in popularity [5, 10]. However, strong demand also exists for socially-driven web s...
Frank Uyeda, Diwaker Gupta, Amin Vahdat, George Va...