Sciweavers

696 search results - page 34 / 140
» Explaining abstract counterexamples
Sort
View
ICFEM
2009
Springer
15 years 9 months ago
Combining Static Model Checking with Dynamic Enforcement Using the Statecall Policy Language
Internet protocols encapsulate a significant amount of state, making implementing the host software complex. In this paper, we define the Statecall Policy Language (SPL) which pr...
Anil Madhavapeddy
BSL
2004
110views more  BSL 2004»
15 years 2 months ago
Notes on quasiminimality and excellence
This paper ties together much of the model theory of the last 50 years. Shelah's attempts to generalize the Morley theorem beyond first order logic led to the notion of excel...
John T. Baldwin
117
Voted
ICLP
2007
Springer
15 years 8 months ago
Contextual Logic Programming for Ontology Representation and Querying
Abstract. The system presented in this paper aims at using Contextual Logic Programming as a computational hub for knowledge modeled by web ontologies and enable querying that repr...
Nuno Lopes 0002, Cláudio Fernandes, Salvado...
114
Voted
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 8 months ago
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods
Abstract. A number of papers on side-channel attacks have been published where the side-channel information was not exploited in an optimal manner, which reduced their efficiency. ...
Werner Schindler
CHES
2004
Springer
230views Cryptology» more  CHES 2004»
15 years 8 months ago
Correlation Power Analysis with a Leakage Model
Abstract. A classical model is used for the power consumption of cryptographic devices. It is based on the Hamming distance of the data handled with regard to an unknown but consta...
Eric Brier, Christophe Clavier, Francis Olivier