Sciweavers

3101 search results - page 560 / 621
» Composing Adaptive Software
Sort
View
117
Voted
FMCAD
2006
Springer
15 years 8 months ago
Post-reboot Equivalence and Compositional Verification of Hardware
We introduce a finer concept of a Hardware Machine, where the set of post-reboot operation states is explicitly a part of the FSM definition. We formalize an ad-hoc flow of combin...
Zurab Khasidashvili, Marcelo Skaba, Daher Kaiss, Z...
161
Voted
CHES
2003
Springer
146views Cryptology» more  CHES 2003»
15 years 8 months ago
Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs
Abstract. Performance evaluation of the Advanced Encryption Standard candidates has led to intensive study of both hardware and software implementations. However, although plentifu...
François-Xavier Standaert, Gaël Rouvro...
ASIACRYPT
2009
Springer
15 years 8 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
WSC
2007
15 years 7 months ago
Supporting parametrization of business games for multiple educational settings
The parametrization of business games benefits from the usage of a multi-tier architecture and software services. This paper shows that the multi-tier concept supports parametriz...
Stijn-Pieter A. van Houten, Alexander Verbraeck
BPM
2008
Springer
207views Business» more  BPM 2008»
15 years 7 months ago
From Personal Task Management to End-User Driven Business Process Modeling
The need to involve business users in process modeling is largely perceived in the context of Business Process Management systems. This can facilitate the elaboration of consistent...
Todor Stoitsev, Stefan Scheidl, Felix Flentge, Max...