Sciweavers

620 search results - page 107 / 124
» Likelihood Computations Using Value Abstraction
Sort
View
IH
2007
Springer
14 years 4 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
IWSOS
2007
Springer
14 years 4 months ago
Dynamic Ontology Mapping for Interacting Autonomous Systems
Abstract. With the emergence of mobile and ubiquitous computing environments, there is a requirement to enable collaborative applications between these environments. As many of the...
Steven Heeps, Joe Sventek, Naranker Dulay, Alberto...
DATE
2006
IEEE
104views Hardware» more  DATE 2006»
14 years 3 months ago
Equivalence verification of arithmetic datapaths with multiple word-length operands
Abstract: This paper addresses the problem of equivalence veriļ¬cation of RTL descriptions that implement arithmetic computations (add, mult, shift) over bitvectors that have diļ¬...
Namrata Shekhar, Priyank Kalla, Florian Enescu
CEC
2005
IEEE
14 years 3 months ago
Adaptive local search parameters for real-coded memetic algorithms
AbstractThis paper presents a real-coded memetic algorithm that combines a high diversity global exploration with an adaptive local search method to the most promising individuals ...
Daniel Molina, Francisco Herrera, Manuel Lozano
ITCC
2005
IEEE
14 years 3 months ago
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
Abstractā€” Masking is a general method used to thwart Differential Power Analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values...
François-Xavier Standaert, Eric Peeters, Je...