Sciweavers

1939 search results - page 52 / 388
» Dynamic Lex Constraints
Sort
View
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
14 years 4 months ago
Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints
In this paper, we propose a preprocessing method to improve Side Channel Attacks (SCAs) on Dual-rail with Precharge Logic (DPL) countermeasure family. The strength of our method i...
Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger,...
SAC
2003
ACM
14 years 2 months ago
Are Multiagent Algorithms Relevant for Real Hardware? A Case Study of Distributed Constraint Algorithms
Researchers building multi-agent algorithms typically work with abstracted away from real applications. The abstracted problem instances allow systematic and detailed investigatio...
Paul Scerri, Pragnesh Jay Modi, Wei-Min Shen, Mili...
AAAI
1996
13 years 11 months ago
Coping with Temporal Constraints in Multimedia Presentation Planning
Computer-based presentation systems enable the realization of effective and dynamic presentation styles that incorporate multiple media. Obvious examples are animated user interfa...
Elisabeth André, Thomas Rist
INFOCOM
2012
IEEE
12 years 2 days ago
Delay and rate-optimal control in a multi-class priority queue with adjustable service rates
—We study two convex optimization problems in a multi-class M/G/1 queue with adjustable service rates: minimizing convex functions of the average delay vector, and minimizing ave...
Chih-Ping Li, Michael J. Neely
ISSTA
2009
ACM
14 years 4 months ago
Precise pointer reasoning for dynamic test generation
Dynamic test generation consists of executing a program while gathering symbolic constraints on inputs from predicates encountered in branch statements, and of using a constraint ...
Bassem Elkarablieh, Patrice Godefroid, Michael Y. ...