Sciweavers

3605 search results - page 91 / 721
» Analysis and Applications of the XDI model
Sort
View
105
Voted
ISORC
2008
IEEE
15 years 7 months ago
Compositional Feasibility Analysis of Conditional Real-Time Task Models
Conditional real-time task models, which are generalizations of periodic, sporadic, and multi-frame tasks, represent real world applications more accurately. These models can be c...
Madhukar Anand, Arvind Easwaran, Sebastian Fischme...
118
Voted
JCS
2010
80views more  JCS 2010»
14 years 7 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
117
Voted
BIRTHDAY
2012
Springer
13 years 8 months ago
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors
3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware com...
Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine...
116
Voted
TCAD
2002
158views more  TCAD 2002»
15 years 9 days ago
Static power modeling of 32-bit microprocessors
The paper presents a novel strategy aimed at modelling instruction energy consumption of 32-bits microprocessors. Differently from former approaches, the proposed instruction-level...
Carlo Brandolese, Fabio Salice, William Fornaciari...
119
Voted
ICPR
2008
IEEE
15 years 7 months ago
Phase diagram of a long bar under a higher-order active contour energy: Application to hydrographic network extraction from VHR
The segmentation of networks is important in several imaging domains, and models incorporating prior shape knowledge are often essential for the automatic performance of this task...
Aymen El Ghoul, Ian H. Jermyn, Josiane Zerubia