Sciweavers

490 search results - page 43 / 98
» Equivalent Keys of HPC
Sort
View
POPL
2000
ACM
14 years 1 months ago
Transforming Out Timing Leaks
It has been shown that secret information can be leaked to external observers through covert timing channels. In this paper we are concerned with a kind of timing attack that want...
Johan Agat
ISCAS
1999
IEEE
114views Hardware» more  ISCAS 1999»
14 years 1 months ago
Nonuniformly offset polyphase synthesis of a bandpass signal from complex-envelope samples
In this paper we consider the synthesis of a bandpass signal from complex-envelope samples using a polyphase conversion structure based on periodically nonuniform output samples. ...
D. Scholnik, J. O. Coleman
CARDIS
1998
Springer
161views Hardware» more  CARDIS 1998»
14 years 29 days ago
Formal Proof of Smart Card Applets Correctness
: The new Gemplus smart card is based on the Java technology, embedding a virtual machine. The security policy uses mechanisms that are based on Java properties. This language prov...
Jean-Louis Lanet, Antoine Requet
FPCA
1987
14 years 6 days ago
Categorical multi-combinators
: Categorical Multi-Combinators form a rewriting system developed with the aim of providing efficient implementations of lazy functional languages. The core of the system of Catego...
Rafael Dueire Lins
CAISE
2008
Springer
13 years 10 months ago
AutoModelGen: A Generic Data Level Implementation of ModelGen
Abstract. The model management operator ModelGen translates a schema expressed in one modelling language into an equivalent schema expressed in another modelling language, and in a...
Andrew Smith, Peter McBrien