Sciweavers

1104 search results - page 158 / 221
» A Comparison of State-Based Modelling Tools for Model Valida...
Sort
View
115
Voted
LCTRTS
2004
Springer
15 years 9 months ago
Flattening statecharts without explosions
We present a polynomial upper bound for flattening of UML statecharts. An efficient flattening technique is derived and implemented in SCOPE—a code generator targeting constra...
Andrzej Wasowski
201
Voted
CATA
2010
15 years 3 months ago
A Hardware Implementation of the Advanced Encryption Standard (AES) Algorithm using SystemVerilog
In this paper, a hardware implementation of the AES128 encryption algorithm is proposed. A unique feature of the proposed pipelined design is that the round keys, which are consum...
Bahram Hakhamaneshi, Behnam S. Arad
ICUMT
2009
15 years 1 months ago
A syntactic approach for identifying multi-protocol attacks
In the context of multiple security protocols running in the same environment, we propose a syntactical approach for identifying multi-protocol attacks. The proposed approach uses ...
Béla Genge, Piroska Haller
OOPSLA
2007
Springer
15 years 10 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden
ICIP
2006
IEEE
16 years 5 months ago
Region Based Segmentation Using the Tree of Shapes
The tree of shapes is a powerful tool for image representation which holds many interesting properties. There are many works in the literature that use it for image segmentation, ...
Gregory Randall, Juan Cardelino, Marcelo Bertalm&i...