Sciweavers

201 search results - page 13 / 41
» An Authorization Logic With Explicit Time
Sort
View
DEDS
1998
152views more  DEDS 1998»
13 years 10 months ago
Timed Petri Nets in Hybrid Systems: Stability and Supervisory Control
In this paper, timed Petri nets are used to model and control hybrid systems. Petri nets are used instead of finite automata primarily because of the advantages they offer in de...
Xenofon D. Koutsoukos, Kevin X. He, Michael D. Lem...
EDCC
2008
Springer
14 years 16 days ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
AHS
2007
IEEE
263views Hardware» more  AHS 2007»
14 years 5 months ago
Programming an FPGA-based Super Computer Using a C-to-VHDL Compiler: DIME-C
Since their invention in the 1980s, the logic density of FPGAs has increased exponentially with time. This increase of logic density first led to the development of synthesisable ...
Gildas Genest, Richard Chamberlain, Robin J. Bruce
PE
2002
Springer
128views Optimization» more  PE 2002»
13 years 10 months ago
Response times in a two-node queueing network with feedback
The study presented in this paper is motivated by the performance analysis of response times in distributed information systems, where transactions are handled by iterative server...
Robert D. van der Mei, Bart Gijsen, N. in't Veld, ...
JUCS
2007
122views more  JUCS 2007»
13 years 10 months ago
Creating Links into the Future
: We are approaching an era where research materials will be stored more and more as digital resources on the World Wide Web. This of course will enable easier access to online pub...
Muhammad Tanvir Afzal, Narayanan Kulathuramaiyer, ...