Sciweavers

2184 search results - page 309 / 437
» Modeling and Realizing Interoperability
Sort
View
EDCC
2008
Springer
13 years 9 months ago
Software Faults Diagnosis in Complex OTS Based Safety Critical Systems
This work addresses the problem of software fault diagnosis in complex safety critical software systems. The transient manifestations of software faults represent a challenging is...
Gabriella Carrozza, Domenico Cotroneo, Stefano Rus...
EDCC
2008
Springer
13 years 9 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
ECIS
2003
13 years 9 months ago
The value of cooperative planning in supply chains. A simulative approach
In this paper we examine, how the benefits of Supply Chain Management, as announced by the literature and widely accepted, can simulatively be proven. We first present selected re...
Luis Martín Díaz, Peter Buxmann
CRYPTO
2010
Springer
158views Cryptology» more  CRYPTO 2010»
13 years 9 months ago
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
Motivated by the question of basing cryptographic protocols on stateless tamper-proof hardware tokens, we revisit the question of unconditional two-prover zero-knowledge proofs fo...
Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit ...
AUTOMATICA
2010
167views more  AUTOMATICA 2010»
13 years 8 months ago
A new kernel-based approach for linear system identification
This paper describes a new kernel-based approach for linear system identification of stable systems. We model the impulse response as the realization of a Gaussian process whose s...
Gianluigi Pillonetto, Giuseppe De Nicolao