Sciweavers

160 search results - page 9 / 32
» Software Manipulation with Annotations in Java
Sort
View
CASES
2009
ACM
14 years 1 months ago
Automatic detection of fault attack and countermeasures
Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN cod...
Ahmadou A. Sere, Julien Iguchi-Cartigny, Jean-Loui...
KI
2011
Springer
13 years 3 months ago
Centurio, a General Game Player: Parallel, Java- and ASP-based
Abstract We present the General Game Playing system Centurio. Centurio is a Java-based player featuring different strategies based on Monte Carlo Tree Search extended by technique...
Maximilian Möller, Marius Thomas Schneider, M...
DOA
2000
102views more  DOA 2000»
13 years 10 months ago
Distributed Xbean Applications
XML has emerged as the universal standard for exchanging and externalizing data. Software products of all kinds are being upgraded to "support XML." Typically this means...
Bruce E. Martin
WSC
2001
13 years 10 months ago
Software for uniform random number generation: distinguishing the good and the bad
The requirements, design principles, and statistical testing approaches of uniform random number generators for simulation are briefly surveyed. An objectoriented random number pa...
Pierre L'Ecuyer
LCTRTS
1999
Springer
14 years 29 days ago
Live Memory Analysis for Garbage Collection in Embedded Systems
Real-time garbage collection is essential if object-oriented languages (in particular, Java) are to become predictable enough for real-time embedded systems. Although techniques f...
Patrik Persson