Sciweavers

2797 search results - page 457 / 560
» Code query by example
Sort
View
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
15 years 6 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...
WSC
2008
15 years 5 months ago
Simulation and optimization for construction repetitive projects using promodel and simrunner
We introduce a new approach, called Relative Start and Idle Time (RSIT), to solve probabilistic scheduling problems of construction repetitive projects. RSIT is a process of deter...
Chachrist Srisuwanrat, Photios G. Ioannou, Omer Ts...
ASM
2008
ASM
15 years 5 months ago
Using EventB to Create a Virtual Machine Instruction Set Architecture
A Virtual Machine (VM) is a program running on a conventional microprocessor that emulates the binary instruction set, registers, and memory space of an idealized computing machine...
Stephen Wright
ECLIPSE
2005
ACM
15 years 5 months ago
InsECTJ: a generic instrumentation framework for collecting dynamic information within Eclipse
The heterogeneity and dynamism of today’s software systems make it difficult to assess the performance, correctness, or security of a system outside the actual time and context ...
Arjan Seesing, Alessandro Orso
CSCLP
2008
Springer
15 years 5 months ago
From Rules to Constraint Programs with the Rules2CP Modelling Language
In this paper, we present a rule-based modelling language for constraint programming, called Rules2CP. Unlike other modelling languages, Rules2CP adopts a single knowledge represen...
François Fages, Julien Martin