Sciweavers

1593 search results - page 210 / 319
» An Intelligent Model and Its Implementation of Search Engine
Sort
View
DRM
2007
Springer
15 years 10 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
HAIS
2010
Springer
15 years 6 months ago
Analysing the Low Quality of the Data in Lighting Control Systems
Energy efficiency represents one of the main challenges in the engineering field, i.e., by means of decreasing the energy consumption due to a better design minimising the energy ...
José Ramón Villar, Enrique A. de la ...
GECCO
2009
Springer
130views Optimization» more  GECCO 2009»
15 years 10 months ago
Liposome logic
VLSI research, in its continuous push toward further miniaturisation, is seeking to break through the limitations of current circuit manufacture techniques by moving towards biomi...
James Smaldon, Natalio Krasnogor, Alexander Camero...
TASE
2008
IEEE
15 years 10 months ago
Verifying BPEL-Like Programs with Hoare Logic
The WS-BPEL language has recently become a de facto standard for modeling Web-based business processes. One of its essential features is the fully programmable compensation mechan...
Chenguang Luo, Shengchao Qin, Zongyan Qiu
TACAS
2005
Springer
115views Algorithms» more  TACAS 2005»
15 years 9 months ago
On-the-Fly Reachability and Cycle Detection for Recursive State Machines
Searching the state space of a system using enumerative and on-the-fly depth-first traversal is an established technique for model checking finite-state systems. In this paper, ...
Rajeev Alur, Swarat Chaudhuri, Kousha Etessami, P....