Sciweavers

2585 search results - page 279 / 517
» computing 1999
Sort
View
NDSS
1999
IEEE
15 years 8 months ago
Addressing the Problem of Undetected Signature Key Compromise
Suppose that messages have been signed using a user's signature private key during the period of time after a key compromise but before the compromise is detected. This is a ...
Mike Just, Paul C. van Oorschot
EUROPAR
1999
Springer
15 years 8 months ago
OCEANS - Optimising Compilers for Embedded Applications
This paper presents an overview of the activities carried out within the ESPRIT project OCEANS whose objective is to investigate and develop advanced compiler infrastructure for em...
Michel Barreteau, François Bodin, Zbigniew ...
EUROPAR
1999
Springer
15 years 8 months ago
An Architecture Framework for Introducing Predicated Execution into Embedded Microprocessors
Growing demand for high performance in embedded systems is creating new opportunities for Instruction-Level Parallelism ILP techniques that are traditionally used in high perform...
Daniel A. Connors, Jean-Michel Puiatti, David I. A...
SIBGRAPI
1999
IEEE
15 years 8 months ago
An Algorithm for Two-Dimensional Mesh Generation for Arbitrary Regions with Cracks
Abstract. This paper describes an algorithm for generating unstructured triangulations for arbitrarily shaped twodimensional regions. The algorithm works for regions without cracks...
Antonio C. O. Miranda, Joaquim B. Cavalcante Neto,...
GD
1999
Springer
15 years 8 months ago
Planarity-Preserving Clustering and Embedding for Large Planar Graphs
In this paper we present a novel approach for cluster-based drawing of large planar graphs that maintains planarity. Our technique works for arbitrary planar graphs and produces a ...
Christian A. Duncan, Michael T. Goodrich, Stephen ...