Sciweavers

3116 search results - page 213 / 624
» Recovering
Sort
View
WOSS
2004
ACM
14 years 4 months ago
Self-managed decentralised systems using K-components and collaborative reinforcement learning
Components in a decentralised system are faced with uncertainty as how to best adapt to a changing environment to maintain or optimise system performance. How can individual compo...
Jim Dowling, Vinny Cahill
AES
2004
Springer
190views Cryptology» more  AES 2004»
14 years 4 months ago
Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results
Abstract. When cryptosystems are being used in real life, hardware and software implementations themselves present a fruitful field for attacks. Side channel attacks exploit infor...
Elena Trichina, Tymur Korkishko, Kyung-Hee Lee
AI
2004
Springer
14 years 4 months ago
Spatio-temporal Reasoning for Vague Regions
Abstract. This paper extends a mereotopological theory of spatiotemporal reasoning to vague ”egg-yolk” regions. In this extension, the egg and its yolk are allowed to move and ...
Zina M. Ibrahim, Ahmed Y. Tawfik
CHES
2004
Springer
136views Cryptology» more  CHES 2004»
14 years 4 months ago
Attacking DSA Under a Repeated Bits Assumption
We discuss how to recover the private key for DSA style signature schemes if partial information about the ephemeral keys is revealed. The partial information we examine is of a se...
Peter J. Leadbitter, Dan Page, Nigel P. Smart
COORDINATION
2004
Springer
14 years 4 months ago
An Operational Semantics for StAC, a Language for Modelling Long-Running Business Transactions
This paper presents the StAC language and its operational semantics. StAC (Structured Activity Compensation) is a business process modelling language and a distinctive feature of t...
Michael J. Butler, Carla Ferreira