Sciweavers

8190 search results - page 1633 / 1638
» From Timed to Hybrid Systems
Sort
View
INDOCRYPT
2010
Springer
13 years 5 months ago
Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers
Abstract. This paper presents the first results on AIDA/cube, algebraic and sidechannel attacks on variable number of rounds of all members of the KATAN family of block ciphers. Ou...
Gregory V. Bard, Nicolas Courtois, Jorge Nakahara,...
AICS
2009
13 years 5 months ago
SceneMaker: Intelligent Multimodal Visualisation of Natural Language Scripts
Abstract. Producing plays, films or animations is a complex and expensive process involving various professionals and media. Our proposed software system, SceneMaker, aims to facil...
Eva Hanser, Paul McKevitt, Tom Lunney, Joan Condel...
ICDCS
2009
IEEE
13 years 5 months ago
The Case for Spam-Aware High Performance Mail Server Architecture
The email volume per mailbox has largely remained low and unchanged in the past several decades, and hence mail server performance has largely remained a secondary issue. The stee...
Abhinav Pathak, Syed Ali Raza Jafri, Y. Charlie Hu
ICETET
2009
IEEE
13 years 5 months ago
Development of HCNG Blended Fuel Engine with Control of NOx Emissions
With increasing concern about energy shortage and environmental protection, research on reducing exhaust emissions, reducing fuel consumption, reducing engine noise and increasing...
K. R. Patil, P. M. Khanwalkar, S. S. Thipse, K. P....
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 4 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
« Prev « First page 1633 / 1638 Last » Next »