Sciweavers

2205 search results - page 324 / 441
» Mutation Operators for Specifications
Sort
View
CIE
2008
Springer
15 years 4 months ago
Principal Typings for Explicit Substitutions Calculi
Having principal typings (for short PT) is an important property of type systems. This property guarantees the possibility of type deduction which means it is possible to develop a...
Daniel Lima Ventura, Mauricio Ayala-Rincón,...
116
Voted
APSCC
2006
IEEE
15 years 4 months ago
GHIDS: Defending Computational Grids against Misusing of Shared Resources
Detecting intrusions at host level is vital to protecting shared resources in grid, but traditional Host-based Intrusion Detecting System (HIDS) is not suitable for grid environme...
Guofu Feng, Xiaoshe Dong, Weizhe Liu, Ying Chu, Ju...
109
Voted
ASAP
2007
IEEE
134views Hardware» more  ASAP 2007»
15 years 4 months ago
Methodology and Toolset for ASIP Design and Development Targeting Cryptography-Based Applications
Network processors utilizing general-purpose instruction-set architectures (ISA) limit network throughput due to latency incurred from cryptography and hashing applications (AES, ...
David Montgomery, Ali Akoglu
119
Voted
CTRSA
2008
Springer
160views Cryptology» more  CTRSA 2008»
15 years 4 months ago
Fault Analysis Study of IDEA
We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher's specific property to employ ...
Christophe Clavier, Benedikt Gierlichs, Ingrid Ver...
142
Voted
DATE
2008
IEEE
121views Hardware» more  DATE 2008»
15 years 4 months ago
Constraint Refinement for Online Verifiable Cross-Layer System Adaptation
Adaptive resource management is critical to ensuring the quality of real-time distributed applications, particularly for energy-constrained mobile handheld devices. In this contex...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...