Sciweavers

1227 search results - page 169 / 246
» Remote Store Programming
Sort
View
CASES
2009
ACM
14 years 2 months ago
Automatic detection of fault attack and countermeasures
Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN cod...
Ahmadou A. Sere, Julien Iguchi-Cartigny, Jean-Loui...
ECAL
1999
Springer
14 years 2 months ago
Arithmetic Operations on Self-Replicating Cellular Automata
In this paper, we present a possible implementation of arithmetic functions (notably, addition and multiplication) using self-replicating cellular automata. The operations are per...
Enrico Petraglio, Jean-Marc Henry, Gianluca Tempes...
IFL
1997
Springer
136views Formal Methods» more  IFL 1997»
14 years 2 months ago
Fully Persistent Graphs - Which One To Choose?
Functional programs, by nature, operate on functional, or persistent, data structures. Therefore, persistent graphs are a prerequisite to express functional graph algorithms. In th...
Martin Erwig
AGP
1993
IEEE
14 years 2 months ago
Static Analysis of Prolog with Cut
Abstract. This paper presents a general approach to the Abstract Interpretation of Prolog programs with cut. In most of previous approaches the cut primitive is merely ignored. Our...
Gilberto Filé, Sabina Rossi
COMPSAC
2009
IEEE
14 years 1 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...