Sciweavers

490 search results - page 43 / 98
» Equivalent Keys of HPC
Sort
View
POPL
2000
ACM
15 years 6 months ago
Transforming Out Timing Leaks
It has been shown that secret information can be leaked to external observers through covert timing channels. In this paper we are concerned with a kind of timing attack that want...
Johan Agat
ISCAS
1999
IEEE
114views Hardware» more  ISCAS 1999»
15 years 6 months ago
Nonuniformly offset polyphase synthesis of a bandpass signal from complex-envelope samples
In this paper we consider the synthesis of a bandpass signal from complex-envelope samples using a polyphase conversion structure based on periodically nonuniform output samples. ...
D. Scholnik, J. O. Coleman
CARDIS
1998
Springer
161views Hardware» more  CARDIS 1998»
15 years 6 months ago
Formal Proof of Smart Card Applets Correctness
: The new Gemplus smart card is based on the Java technology, embedding a virtual machine. The security policy uses mechanisms that are based on Java properties. This language prov...
Jean-Louis Lanet, Antoine Requet
FPCA
1987
15 years 5 months ago
Categorical multi-combinators
: Categorical Multi-Combinators form a rewriting system developed with the aim of providing efficient implementations of lazy functional languages. The core of the system of Catego...
Rafael Dueire Lins
CAISE
2008
Springer
15 years 3 months ago
AutoModelGen: A Generic Data Level Implementation of ModelGen
Abstract. The model management operator ModelGen translates a schema expressed in one modelling language into an equivalent schema expressed in another modelling language, and in a...
Andrew Smith, Peter McBrien