Sciweavers

2043 search results - page 264 / 409
» Reasoning About Security Models
Sort
View
PPDP
2009
Springer
15 years 12 months ago
Model-checking higher-order functions
We propose a novel type-based model checking algorithm for higher-order recursion schemes. As shown by Kobayashi, verification problems of higher-order functional programs can ea...
Naoki Kobayashi
SLE
2009
Springer
15 years 10 months ago
Multi-view Composition Language for Software Product Line Requirements
Composition of requirements models in Software Product Line (SPL) development enables stakeholders to derive the requirements of target software products and, very important, to re...
Mauricio Alférez, João Santos, Ana M...
FORMATS
2008
Springer
15 years 7 months ago
Comparing the Expressiveness of Timed Automata and Timed Extensions of Petri Nets
Time dependant models have been intensively studied for many reasons, among others because of their applications in software verification and due to the development of embedded pla...
Jirí Srba
MICRO
2008
IEEE
136views Hardware» more  MICRO 2008»
15 years 11 months ago
Power to the people: Leveraging human physiological traits to control microprocessor frequency
Any architectural optimization aims at satisfying the end user. However, modern architectures execute with little to no knowledge about the individual user. If architectures could...
Alex Shye, Yan Pan, Benjamin Scholbrock, J. Scott ...
FSE
2008
Springer
143views Cryptology» more  FSE 2008»
15 years 7 months ago
Algebraic and Slide Attacks on KeeLoq
KeeLoq is a block cipher used in wireless devices that unlock the doors and alarms in cars manufactured by Chrysler, Daewoo, Fiat, GM, Honda, Jaguar, Toyota, Volvo, Volkswagen, etc...
Nicolas Courtois, Gregory V. Bard, David Wagner