Sciweavers

2314 search results - page 310 / 463
» What is a Model
Sort
View
FDL
2004
IEEE
15 years 8 months ago
A Formal Verification Approach for IP-based Designs
This paper proposes a formal verification methodology which is smoothly integrated with component-based system-level design, using a divide and conquer approach. The methodology a...
Daniel Karlsson, Petru Eles, Zebo Peng
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
15 years 8 months ago
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy
We present the first universally verifiable voting scheme that can be based on a general assumption (existence of a non-interactive commitment scheme). Our scheme is also the first...
Tal Moran, Moni Naor
COMPSAC
2001
IEEE
15 years 8 months ago
Tailoring E-Commerce Sites to Ease Recovery after Disruptions
Developers of e-commerce applications are often unrealistic about how their site will be used, and about possible outcomes during site usage. The most commonly considered outcomes...
Karen Renaud, Tobias van Dyk
ASPDAC
1995
ACM
104views Hardware» more  ASPDAC 1995»
15 years 8 months ago
Power analysis of a 32-bit embedded microcontroller
A new approach for power analysis of microprocessorshas recently been proposed [1]. The idea is to look at the power consumption in a microprocessor from the point of view of the ...
Vivek Tiwari, Mike Tien-Chien Lee
SPW
2000
Springer
15 years 8 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen