Sciweavers

228 search results - page 11 / 46
» Two Normal Forms for Rewriting P Systems
Sort
View
ICTAC
2004
Springer
14 years 22 days ago
A Proof of Weak Termination Providing the Right Way to Terminate
We give an inductive method for proving weak innermost termination of rule-based programs, from which we automatically infer, for each successful proof, a finite strategy for data...
Olivier Fissore, Isabelle Gnaedig, Hél&egra...
CHES
2001
Springer
193views Cryptology» more  CHES 2001»
13 years 12 months ago
Preventing SPA/DPA in ECC Systems Using the Jacobi Form
Abstract. In this paper we show how using a representation of an elliptic curve as the intersection of two quadrics in P3 can provide a defence against Simple and Differental Powe...
Pierre-Yvan Liardet, Nigel P. Smart
FSTTCS
2008
Springer
13 years 8 months ago
A Hierarchy of Semantics for Non-deterministic Term Rewriting Systems
ABSTRACT. Formalisms involving some degree of nondeterminism are frequent in computer science. In particular, various programming or specification languages are based on term rewr...
Juan Rodríguez-Hortalá
ACNS
2006
Springer
109views Cryptology» more  ACNS 2006»
14 years 1 months ago
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
Unstructured P2P systems have gained great popularity in recent years and are currently used by millions of users. One fundamental property of these systems is the lack of structu...
Elias Athanasopoulos, Kostas G. Anagnostakis, Evan...
INFOCOM
2009
IEEE
14 years 2 months ago
Distilling Superior Peers in Large-Scale P2P Streaming Systems
Abstract—In large-scale peer-to-peer (P2P) live streaming systems with a limited supply of server bandwidth, increasing the amount of upload bandwidth supplied by peers becomes c...
Zimu Liu, Chuan Wu, Baochun Li, Shuqiao Zhao