Sciweavers

2715 search results - page 431 / 543
» Database Publication Practices
Sort
View
POPL
2008
ACM
16 years 5 months ago
Engineering formal metatheory
Machine-checked proofs of properties of programming languages have become a critical need, both for increased confidence in large and complex designs and as a foundation for techn...
Arthur Charguéraud, Benjamin C. Pierce, Bri...
148
Voted
WISEC
2010
ACM
15 years 12 months ago
Providing security with insecure systems
Abstract A Martian who arrived on Earth today would surely conclude that computing and communications security are in a crisis situation. The popular media as well as technical pub...
Andrew M. Odlyzko
EVOW
2010
Springer
15 years 11 months ago
Parameter Tuning of Evolutionary Algorithms: Generalist vs. Specialist
Abstract. Finding appropriate parameter values for Evolutionary Algorithms (EAs) is one of the persistent challenges of Evolutionary Computing. In recent publications we showed how...
Selmar K. Smit, A. E. Eiben
CCS
2009
ACM
15 years 11 months ago
Behavior based software theft detection
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
RECONFIG
2009
IEEE
172views VLSI» more  RECONFIG 2009»
15 years 11 months ago
Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow
Abstract—The main challenge when implementing cryptographic algorithms in hardware is to protect them against attacks that target directly the device. Two strategies are customar...
Shivam Bhasin, Jean-Luc Danger, Florent Flament, T...