Sciweavers

1984 search results - page 275 / 397
» Binary Component Adaptation
Sort
View
ECSA
2011
Springer
14 years 3 months ago
Architecture-Based Run-Time Fault Diagnosis
Abstract. An important step in achieving robustness to run-time faults is the ability to detect and repair problems when they arise in a running system. Effective fault detection a...
Paulo Casanova, Bradley R. Schmerl, David Garlan, ...
IACR
2011
105views more  IACR 2011»
14 years 3 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
Indistinguishability Amplification
system is the abstraction of the input-output behavior of any kind of discrete system, in particular cryptographic systems. Many aspects of cryptographic security analyses and pro...
Ueli M. Maurer, Krzysztof Pietrzak, Renato Renner
MAGS
2006
150views more  MAGS 2006»
15 years 4 months ago
The Agent-Rule-Class framework for Multi-Agent Systems
Multi-Agent Systems (MAS) have become increasingly mature, but this maturity does not make the traditional Object Oriented (OO) approaches obsolete. On the contrary, building MAS i...
Liang Xiao 0002, Des Greer
133
Voted
TROB
2002
169views more  TROB 2002»
15 years 3 months ago
Constructing reconfigurable software for machine control systems
Reconfigurable software is highly desired for automated machine tool control systems for low-cost products and short time to market. In this paper, we propose a software architectu...
Shige Wang, Kang G. Shin