Sciweavers

10568 search results - page 1956 / 2114
» Computer Intelligence and Formalization
Sort
View
140
Voted
IACR
2011
132views more  IACR 2011»
14 years 3 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
173
Voted
AOSD
2012
ACM
13 years 11 months ago
A monadic interpretation of execution levels and exceptions for AOP
Aspect-Oriented Programming (AOP) started fifteen years ago with the remark that modularization of so-called crosscutting functionalities is a fundamental problem for the enginee...
Nicolas Tabareau
152
Voted
CORR
2012
Springer
225views Education» more  CORR 2012»
13 years 11 months ago
The Filter-Placement Problem and its Application to Minimizing Information Multiplicity
In many information networks, data items – such as updates in social networks, news flowing through interconnected RSS feeds and blogs, measurements in sensor networks, route u...
Dóra Erdös, Vatche Ishakian, Andrei La...
242
Voted
TASE
2012
IEEE
13 years 11 months ago
Discrete-Event Coordination Design for Distributed Agents
— This paper presents new results on the formal design of distributed coordinating agents in a discrete-event framework. In this framework, agents are modeled to be individually ...
Manh Tung Pham, Kiam Tian Seow
ER
2007
Springer
237views Database» more  ER 2007»
15 years 9 months ago
Business Process and Business Rule Modeling Languages for Compliance Management: A Representational Analysis
Organizations are under increasing scrutiny to document their compliance to regulatory requirements. To this end, they have to formally document their operating procedures to supp...
Michael zur Muehlen, Marta Indulska, Gerrit Kamp
« Prev « First page 1956 / 2114 Last » Next »