Sciweavers

2125 search results - page 296 / 425
» Points with Type-2 Operations
Sort
View
WETICE
2003
IEEE
14 years 3 months ago
Design and Implementation of Virtual Private Services
Large scale distributed applications such as electronic commerce and online marketplaces combine network access with multiple storage and computational elements. The distributed r...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
PLDI
2003
ACM
14 years 3 months ago
A static analyzer for large safety-critical software
d Abstract) Bruno Blanchet∗ § Patrick Cousot§ Radhia Cousot∗¶ J´erˆome Feret§ Laurent Mauborgne§ Antoine Min´e§ David Monniaux∗§ Xavier Rival§ that abstract inter...
Bruno Blanchet, Patrick Cousot, Radhia Cousot, J&e...
SAC
2003
ACM
14 years 3 months ago
Manpower Scheduling with Time Windows
In this paper, we propose a manpower allocation model with time windows which is of practical interest to serviceman scheduling operations. Specifically, this problem originates f...
Andrew Lim, Brian Rodrigues, Lei Song
DFG
2003
Springer
14 years 3 months ago
Inheritance of Business Processes: A Journey Visiting Four Notorious Problems
Abstract. The new millennium is characterized by speed and distribution in every aspect of most business and organization undertaking. Organizations are challenged to bring ideas a...
Wil M. P. van der Aalst
FC
2003
Springer
171views Cryptology» more  FC 2003»
14 years 3 months ago
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)
Abstract. In this paper we describe several fault attacks on the Advanced Encryption Standard (AES). First, using optical/eddy current fault induction attacks as recently publicly ...
Johannes Blömer, Jean-Pierre Seifert