Sciweavers

469 search results - page 50 / 94
» Putting curry-howard to work
Sort
View
EPIA
2003
Springer
14 years 26 days ago
An Evolvable Rule-Based E-mail Agent
The Semantic Web is a “living organism”, which combines autonomously evolving data sources/knowledge repositories. This dynamic character of the Semantic Web requires (declarat...
José Júlio Alferes, Antonio Brogi, J...
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
14 years 22 days ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
MICRO
2002
IEEE
128views Hardware» more  MICRO 2002»
14 years 16 days ago
Compiler-directed instruction cache leakage optimization
Excessive power consumption is widely considered as a major impediment to designing future microprocessors. With the continued scaling down of threshold voltages, the power consum...
Wei Zhang 0002, Jie S. Hu, Vijay Degalahal, Mahmut...
CDC
2009
IEEE
131views Control Systems» more  CDC 2009»
14 years 11 days ago
Dynamic clock calibration via temperature measurement
— We study a clock calibration problem for an ultra-low power timer on a sensor node platform. When the sensor is put into sleep mode, this timer is the only thing left running, ...
David I. Shuman, Mingyan Liu
SAC
2009
ACM
14 years 9 days ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell