Sciweavers

2125 search results - page 204 / 425
» Points with Type-2 Operations
Sort
View
ICLP
1993
Springer
15 years 8 months ago
On Copy Avoidance in Single Assignment Languages
: Copy avoidance refers to the safe replacement, at compile time, of copying operations by destructive updates in single-assignment languages. Conceptually, the problem can be divi...
Saumya K. Debray
APSEC
2007
IEEE
15 years 8 months ago
Realizability of Collaboration-based Service Specifications
This paper is concerned with compositional specification of services using UML 2 collaborations, activity and interaction diagrams. It addresses the problem of realizability: give...
Humberto Nicolás Castejón, Rolv Br&a...
ICARIS
2007
Springer
15 years 7 months ago
Defence Against 802.11 DoS Attacks Using Artificial Immune System
In this paper we present an Artificial Immune System (AIS) based security framework, which prevents a number of serious Denial of Service (DoS) attacks. The proposed security frame...
M. Zubair Shafiq, Muddassar Farooq
COMPSAC
2004
IEEE
15 years 7 months ago
Modular Design of Reactive Systems
: We concentrate on two major aspects of reactive system design: behavior control and modularity. These are studied from a formal point of view, within the framework of action syst...
Cristina Cerschi Seceleanu, Tiberiu Seceleanu
ENC
2004
IEEE
15 years 7 months ago
On the Hardware Design of an Elliptic Curve Cryptosystem
We present a hardware architecture for an Elliptic Curve Cryptography System performing the three basic cryptographic schemes: DH key generation, encryption and digital signature....
Miguel Morales-Sandoval, Claudia Feregrino Uribe