Sciweavers

140 search results - page 25 / 28
» Interpretation and Transformation for Abstracting Conversati...
Sort
View
IACR
2011
132views more  IACR 2011»
13 years 9 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
VIS
2009
IEEE
224views Visualization» more  VIS 2009»
15 years 11 months ago
Game Engines for Visualization
Visualization is the transformation of data or information into pictures. The need for visualization has become more apparent as the amount of available information has increased ...
Nick Green, Alex Pang
EMSOFT
2004
Springer
15 years 1 months ago
A methodology for generating verified combinatorial circuits
High-level programming languages offer significant expressivity but provide little or no guarantees about resource use. Resourcebounded languages -- such as hardware-description l...
Oleg Kiselyov, Kedar N. Swadi, Walid Taha
HYBRID
2000
Springer
15 years 1 months ago
Towards Procedures for Systematically Deriving Hybrid Models of Complex Systems
Abstract. In many cases, complex system behaviors are naturally modeled as nonlinear differential equations. However, these equations are often hard to analyze because of "sti...
Pieter J. Mosterman, Gautam Biswas
ICALP
2000
Springer
15 years 1 months ago
A Statically Allocated Parallel Functional Language
Abstract. We describe SAFL, a call-by-value first-order functional language which is syntactically restricted so that storage may be statically allocated to fixed locations. Evalua...
Alan Mycroft, Richard Sharp