Sciweavers

6960 search results - page 1156 / 1392
» Continuity Analysis of Programs
Sort
View
118
Voted
CSMR
2009
IEEE
15 years 10 months ago
Comparing Stability of Implementation Techniques for Multi-agent System Product Lines
Multi-agent systems (MAS) are increasingly being exploited to support autonomous recommendation of products and information to contemporary application users. Multi-agent system p...
Camila Nunes, Uirá Kulesza, Cláudio ...
143
Voted
RECONFIG
2009
IEEE
118views VLSI» more  RECONFIG 2009»
15 years 10 months ago
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations
Abstract. Protecting an implementation against Side Channel Analysis for Reverse Engineering (SCARE) attacks is a great challenge and we address this challenge by presenting a fir...
Julien Bringer, Hervé Chabanne, Jean-Luc Da...
ICST
2009
IEEE
15 years 10 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
EUROPAR
2009
Springer
15 years 10 months ago
Searching for Concurrent Design Patterns in Video Games
The transition to multicore architectures has dramatically underscored the necessity for parallelism in software. In particular, while new gaming consoles are by and large multicor...
Micah J. Best, Alexandra Fedorova, Ryan Dickie, An...
116
Voted
FM
2009
Springer
155views Formal Methods» more  FM 2009»
15 years 10 months ago
Towards an Operational Semantics for Alloy
Abstract. The Alloy modeling language has a mathematically rigorous denotational semantics based on relational algebra. Alloy specifications often represent operations on a state,...
Theophilos Giannakopoulos, Daniel J. Dougherty, Ka...
« Prev « First page 1156 / 1392 Last » Next »