Sciweavers

1560 search results - page 28 / 312
» Order Functions and Evaluation Codes
Sort
View
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
14 years 3 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
APSEC
2007
IEEE
14 years 22 days ago
Simultaneous Modification Support based on Code Clone Analysis
Maintaining software systems becomes more difficult as their size and complexity increase. One factor that makes software maintenance more difficult is the presence of code clones...
Yoshiki Higo, Yasushi Ueda, Shinji Kusumoto, Katsu...
ICSM
2008
IEEE
14 years 3 months ago
Automatically identifying C++0x concepts in function templates
An automated approach to the identification of C++0x concepts in function templates is described. Concepts are part of a new language feature appearing in the next standard for C+...
Andrew Sutton, Jonathan I. Maletic
RTS
2006
84views more  RTS 2006»
13 years 8 months ago
Improving WCET by applying worst-case path optimizations
It is advantageous to perform compiler optimizations that attempt to lower the worst-case execution time (WCET) of an embedded application since tasks with lower WCETs are easier ...
Wankang Zhao, William C. Kreahling, David B. Whall...
GECCO
2007
Springer
181views Optimization» more  GECCO 2007»
14 years 18 days ago
Learning recursive programs with cooperative coevolution of genetic code mapping and genotype
The Probabilistic Adaptive Mapping Developmental Genetic Programming (PAM DGP) algorithm that cooperatively coevolves a population of adaptive mappings and associated genotypes is...
Garnett Carl Wilson, Malcolm I. Heywood