Sciweavers

96 search results - page 2 / 20
» A Survey of Symbolic Methods in Computational Analysis of Cr...
Sort
View
CASES
2003
ACM
13 years 11 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
FM
2006
Springer
153views Formal Methods» more  FM 2006»
13 years 9 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
ICDAR
2009
IEEE
14 years 12 days ago
Graphic Symbol Recognition Using Graph Based Signature and Bayesian Network Classifier
We present a new approach for recognition of complex graphic symbols in technical documents. Graphic symbol recognition is a well known challenge in the field of document image an...
Muhammad Muzzamil Luqman, Thierry Brouard, Jean-Yv...
ICCAD
2010
IEEE
124views Hardware» more  ICCAD 2010»
13 years 3 months ago
Symbolic performance analysis of elastic systems
Elastic systems, either synchronous or asynchronous, can be optimized for the average-case performance when they have units with early evaluation or variable latency. The performan...
Marc Galceran Oms, Jordi Cortadella, Michael Kishi...
JUCS
2002
113views more  JUCS 2002»
13 years 5 months ago
The Origins and the Development of the ASM Method for High Level System Design and Analysis
: The research belonging to the Abstract State Machines approach to system design and analysis is surveyed and documented in an annotated ASM bibliography. The survey covers the pe...
Egon Börger