Sciweavers

7811 search results - page 1332 / 1563
» computing 2004
Sort
View
EKAW
2004
Springer
15 years 7 months ago
Towards a Knowledge-Aware Office Environment
The objective of the Semantic Web is to make the Web amenable to computer processing, and hence to improve the value that humans can obtain from it. One of the oft-touted user bene...
Les Carr, Timothy Miles-Board, Gary Wills, Arouna ...
EMSOFT
2004
Springer
15 years 7 months ago
Separation of concerns: overhead in modeling and efficient simulation techniques
Separating the description of important aspects of a design such as behavior and architecture, or computation and communication, may yield significant advantages in design time as...
Guang Yang 0004, Alberto L. Sangiovanni-Vincentell...
EUROCRYPT
2004
Springer
15 years 7 months ago
Secure Hashed Diffie-Hellman over Non-DDH Groups
We show that in applications that use the Diffie-Hellman (DH) transform but take care of hashing the DH output (as required, for example, for secure DH-based encryption and key ex...
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
EUROMICRO
2004
IEEE
15 years 7 months ago
Evaluation of Component Technologies with Respect to Industrial Requirements
We compare existing component technologies for embedded systems with respect to industrial requirements. The requirements are collected from the vehicular industry, but our findin...
Anders Möller, Mikael Åkerholm, Johan F...
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
15 years 7 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
« Prev « First page 1332 / 1563 Last » Next »