We study a novel problem of mining significant recurrent rules from a sequence database. Recurrent rules have the form "whenever a series of precedent events occurs, eventuall...
Time dependant models have been intensively studied for many reasons, among others because of their applications in software verification and due to the development of embedded pla...
This paper presents SPA (Simple Power Analysis) attacks against public-key cryptosystems implemented on an FPGA platform. The SPA attack investigates a power waveform generated by...
The work presented in this paper targets the software integration on the level of business process models. The goal is to create the behavioural description of an integrated syste...
Georg Grossmann, Michael Schrefl, Markus Stumptner
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...