Sciweavers

8699 search results - page 162 / 1740
» Elements of the Theory of Computation
Sort
View
TPHOL
2008
IEEE
15 years 6 months ago
A Type of Partial Recursive Functions
We describe a new method to represent (partial) recursive functions in type theory. For every recursive definition, we define a co-inductive type of prophecies that characterises...
Ana Bove, Venanzio Capretta
ESORICS
2007
Springer
15 years 5 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...
DSOM
2005
Springer
15 years 5 months ago
Control Considerations for Scalable Event Processing
The growth in the scale of systems and networks has created many challenges for their management, especially for event processing. Our premise is that scaling event processing requ...
Wei Xu, Joseph L. Hellerstein, Bill Kramer, David ...
CDC
2009
IEEE
117views Control Systems» more  CDC 2009»
15 years 4 months ago
Information dissemination in networks via linear iterative strategies over finite fields
— Given an arbitrary network of interconnected nodes, each with an initial value from a discrete set, we consider the problem of distributively disseminating these initial values...
Shreyas Sundaram, Christoforos N. Hadjicostis
EIT
2008
IEEE
15 years 1 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno