Sciweavers

1816 search results - page 286 / 364
» Trace oblivious computation
Sort
View
SMA
2006
ACM
150views Solid Modeling» more  SMA 2006»
14 years 2 months ago
Conformal virtual colon flattening
We present an efficient colon flattening algorithm using conformal structure, which is angle-preserving and minimizes the global distortion. Moreover, our algorithm is general w...
Wei Hong, Xianfeng Gu, Feng Qiu, Miao Jin, Arie E....
EDOC
2005
IEEE
14 years 2 months ago
Semantics of UML 2.0 Activity Diagram for Business Modeling by Means of Virtual Machine
— The paper proposes a more formalized definition of UML 2.0 Activity Diagram semantics. A subset of activity diagram constructs relevant for business process modeling is conside...
Valdis Vitolins, Audris Kalnins
ITCC
2005
IEEE
14 years 2 months ago
Disciplined Methods of Software Specification: A Case Study
We describe our experience applying tabular mathematical approaches to software specifications. Our purpose is to show alternative approaches to writing tabular specifications and...
Robert L. Baber, David Lorge Parnas, Sergiy A. Vil...
ITCC
2005
IEEE
14 years 2 months ago
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
Abstract— Masking is a general method used to thwart Differential Power Analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values...
François-Xavier Standaert, Eric Peeters, Je...
LCN
2005
IEEE
14 years 2 months ago
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN
—TCP/IP protocol suite carries most application data in Internet. TCP flow retrieval has more security meanings than the IP packet payload. Hence, monitoring the TCP flow has mor...
Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Z...