Sciweavers

2116 search results - page 153 / 424
» Resource Analysis by Sup-interpretation
Sort
View
122
Voted
CSJM
2008
52views more  CSJM 2008»
15 years 4 months ago
Specific features in automatic processing of the formations with prefixes
This article contains the information about the defining and analysis of some rules which will permit the automatic retrieving of the romanian prefixed formations and enriching th...
Mircea Petic
118
Voted
ENTCS
2006
105views more  ENTCS 2006»
15 years 4 months ago
Feasible Reactivity for Synchronous Cooperative Threads
We are concerned with programs composed of cooperative threads whose execution proceeds in synchronous rounds called instants. We develop static analysis methods to guarantee that...
Roberto M. Amadio, Frédéric Dabrowsk...
114
Voted
SIGOPS
2010
83views more  SIGOPS 2010»
15 years 2 months ago
Cloudifying source code repositories: how much does it cost?
—Cloud computing provides us with general purpose storage and server hosting platforms at a reasonable price. We explore the possibility of tapping these resources for the purpos...
Michael Siegenthaler, Hakim Weatherspoon
139
Voted
WISA
2009
Springer
15 years 10 months ago
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation
Power analysis has shown to be successful in breaking symmetric cryptographic algorithms implemented on low resource devices. Prompted by the breaking of many protected implementat...
J. Pan, J. I. den Hartog, Jiqiang Lu
153
Voted
RTAS
2008
IEEE
15 years 10 months ago
Schedulability Analysis of MSC-based System Models
Message Sequence Charts (MSCs) are widely used for describing interaction scenarios between the components of a distributed system. Consequently, worst-case response time estimati...
Lei Ju, Abhik Roychoudhury, Samarjit Chakraborty