Sciweavers

17 search results - page 3 / 4
» Mathematics mechanization and applications after thirty year...
Sort
View
FDL
2005
IEEE
13 years 12 months ago
Meta Modelling of Embedded Systems using Active Databases
The development process of embedded systems is characterized by the cooperation of various domains: components of hardware and software have to be considered as well as components...
Dieter Monjau, Mathias Sporer
ISPASS
2010
IEEE
14 years 1 months ago
Runahead execution vs. conventional data prefetching in the IBM POWER6 microprocessor
After many years of prefetching research, most commercially available systems support only two types of prefetching: software-directed prefetching and hardware-based prefetchers u...
Harold W. Cain, Priya Nagpurkar
VIROLOGY
2010
179views more  VIROLOGY 2010»
13 years 4 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
PKC
2000
Springer
166views Cryptology» more  PKC 2000»
13 years 9 months ago
Design Validations for Discrete Logarithm Based Signature Schemes
A number of signature schemes and standards have been recently designed, based on the Discrete Logarithm problem. In this paper we conduct design validation of such schemes while t...
Ernest F. Brickell, David Pointcheval, Serge Vaude...
INFORMS
1998
150views more  INFORMS 1998»
13 years 6 months ago
Branch and Infer: A Unifying Framework for Integer and Finite Domain Constraint Programming
constraint abstractions into integer programming, and to discuss possible combinations of the two approaches. Combinatorial problems are ubiquitous in many real world applications ...
Alexander Bockmayr, Thomas Kasper