Sciweavers

2468 search results - page 368 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
120
Voted
EDCC
2008
Springer
15 years 5 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
134
Voted
IROS
2009
IEEE
203views Robotics» more  IROS 2009»
15 years 10 months ago
CoMutaR: A framework for multi-robot coordination and task allocation
— In multi-robot systems, task allocation and coordination are two fundamental problems that share high synergy. Although multi-robot architectures typically separate them into d...
Pedro M. Shiroma, Maria Fernando Montenegro Campos
138
Voted
IFM
2007
Springer
129views Formal Methods» more  IFM 2007»
15 years 9 months ago
Slotted-Circus
Material Flow Abstraction of Manufacturing Systems. ‣Umberto Costa, Ivan de Medeiros Jr and Marcel Oliveira. Specification and Verification of a MPI Implementation for a MP-SoC...
Andrew Butterfield, Adnan Sherif, Jim Woodcock
152
Voted
ACL
2006
15 years 5 months ago
Minimum Risk Annealing for Training Log-Linear Models
When training the parameters for a natural language system, one would prefer to minimize 1-best loss (error) on an evaluation set. Since the error surface for many natural languag...
David A. Smith, Jason Eisner
117
Voted
IPPS
2008
IEEE
15 years 10 months ago
On performance bottleneck of anonymous communication networks
Although a significant amount of effort has been directed at discovering attacks against anonymity communication networks and developing countermeasures to those attacks, there i...
Ryan Pries, Wei Yu, Steve Graham, Xinwen Fu