Sciweavers

2015 search results - page 275 / 403
» Hidden Software Capabilities
Sort
View
FPGA
2000
ACM
175views FPGA» more  FPGA 2000»
14 years 27 days ago
An FPGA implementation and performance evaluation of the Serpent block cipher
With the expiration of the Data Encryption Standard (DES) in 1998, the Advanced Encryption Standard (AES) development process is well underway. It is hoped that the result of the ...
Adam J. Elbirt, Christof Paar
MA
2000
Springer
99views Communications» more  MA 2000»
14 years 26 days ago
Multiple Agent-Based Autonomy for Satellite Constellations
Multiple, highly autonomous, satellite systems are envisioned in the near future because they are capable of higher performance, lower cost, better fault tolerance, reconfigurabil...
Thomas P. Schetter, Mark E. Campbell, Derek M. Sur...
PEPM
2000
ACM
14 years 26 days ago
Calculating Sized Types
Many program optimisations and analyses, such as arraybound checking, termination analysis, etc, dependon knowing the size of a function's input and output. However, size inf...
Wei-Ngan Chin, Siau-Cheng Khoo
PEPM
1995
ACM
14 years 25 days ago
Towards Creating Specialised Integrity Checks through Partial Evaluation of Meta-Interpreters
In [23] we presented a partial evaluation scheme for a “real life” subset of Prolog, containing first-order built-in’s, simple side-effects and the operational predicate i...
Michael Leuschel, Danny De Schreye
USENIX
2007
13 years 11 months ago
From STEM to SEAD: Speculative Execution for Automated Defense
Most computer defense systems crash the process that they protect as part of their response to an attack. Although recent research explores the feasibility of selfhealing to autom...
Michael E. Locasto, Angelos Stavrou, Gabriela F. C...