Sciweavers

6960 search results - page 1112 / 1392
» Continuity Analysis of Programs
Sort
View
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
15 years 9 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
124
Voted
STACS
2005
Springer
15 years 9 months ago
Recursive Markov Chains, Stochastic Grammars, and Monotone Systems of Nonlinear Equations
We introduce and study Recursive Markov Chains (RMCs), which extend ordinary finite state Markov chains with the ability to invoke other Markov chains in a potentially recursive m...
Kousha Etessami, Mihalis Yannakakis
UML
2005
Springer
15 years 9 months ago
Domain Models Are Aspect Free
Abstract. Proponents of aspect orientation have successfully seeded the impression that aspects—like objects—are so fundamental a notion that they should pervade all phases and...
Friedrich Steimann
GECCO
2005
Springer
129views Optimization» more  GECCO 2005»
15 years 9 months ago
Search space modulation in genetic algorithms: evolving the search space by sinusoidal transformations
An experimental form of Modulation (Reinterpretation) of the Search Space is presented. This modulation is developed as a mathematical method that can be implemented directly into...
José Antonio Martin H.
ASIASIM
2004
Springer
15 years 9 months ago
A Scalable, Ordered Scenario-Based Network Security Simulator
A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, netw...
Joo Beom Yun, Eung Ki Park, Eul-Gyu Im, Hoh Peter ...
« Prev « First page 1112 / 1392 Last » Next »