Sciweavers

2799 search results - page 351 / 560
» computing 1998
Sort
View
EUROCRYPT
1998
Springer
15 years 8 months ago
A Formal Treatment of Remotely Keyed Encryption
Remotely keyed encryption schemes (RKESs), introduced by Blaze 6], support high-bandwidth cryptographic applications (such as encrypted video conferences) in which long-lived secre...
Matt Blaze, Joan Feigenbaum, Moni Naor
FOSSACS
1998
Springer
15 years 8 months ago
Generalizing Domain Theory
Abstract. Domain theory began in an attempt to provide mathematical models for high-level programming languages, an area where it has proved to be particularly useful. It is perhap...
Michael W. Mislove
FPL
1998
Springer
99views Hardware» more  FPL 1998»
15 years 8 months ago
Exploiting Contemporary Memory Techniques in Reconfigurable Accelerators
This paper discusses the memory interface of custom computing machines. We present a high speed parallel memory for the MoM-PDA machine, which is based on the Xputer paradigm. The ...
Reiner W. Hartenstein, Michael Herz, Thomas Hoffma...
HPCN
1998
Springer
15 years 8 months ago
Evaluation of Two Compiler-Based Approaches for the Parallelisation of an MPEG-2 Decoder
In this paper, we evaluate two different approaches for the compiler-based parallelisation of a C program for MPEG-2 decoding. The first approach experiments with a commercial auto...
Arnaud Laffitte, Rizos Sakellariou, John R. Gurd
ICES
1998
Springer
108views Hardware» more  ICES 1998»
15 years 8 months ago
Evolvable Hardware for Space Applications
This paper focuses on characteristics and applications of evolvable hardware (EHW) to space systems. The motivation for looking at EHW originates in the need for more autonomous ad...
Adrian Stoica, Alex S. Fukunaga, Ken Hayworth, Car...