Sciweavers

2624 search results - page 365 / 525
» The 2LIP model and its implementations
Sort
View
CSFW
2007
IEEE
14 years 4 months ago
Compositional Security for Task-PIOAs
Task-PIOA is a modeling framework for distributed systems with both probabilistic and nondeterministic behaviors. It is suitable for cryptographic applications because its task-bas...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
HICSS
2007
IEEE
144views Biometrics» more  HICSS 2007»
14 years 4 months ago
The Indicator Browser: A Web-Based Interface for Visualizing UrbanSim Simulation Results
Abstract— UrbanSim is a large scale land use and transportation simulator that models the possible long-term effects of different policies on urban regions. The output is present...
Yael Schwartzman, Alan Borning
CSMR
2006
IEEE
14 years 4 months ago
IntensiVE, a toolsuite for documenting and checking structural source-code regularities
As size and complexity of software systems increase, preserving the design and specification of their implementation structure gains importance in order to maintain the evolvabil...
Kim Mens, Andy Kellens
PPPJ
2006
ACM
14 years 4 months ago
Experiences with the development of a reverse engineering tool for UML sequence diagrams: a case study in modern Java developmen
The development of a tool for reconstructing UML sequence diagrams from executing Java programs is a challenging task. We implemented such a tool designed to analyze any kind of J...
Matthias Merdes, Dirk Dorsch
ITCC
2005
IEEE
14 years 4 months ago
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
Abstract— Masking is a general method used to thwart Differential Power Analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values...
François-Xavier Standaert, Eric Peeters, Je...