Sciweavers

1090 search results - page 85 / 218
» Resource-Bounded Partial Evaluation
Sort
View
ICDCSW
2005
IEEE
15 years 3 months ago
Analysis and Algorithms for Content-Based Event Matching
    Content-based  event  matching  is  an  important  problem  in  large-scale  event-based  publish/subscribe  systems.  However,  open  questions  remain  in ...
Satyen Kale, Elad Hazan, Fengyun Cao, Jaswinder Pa...
ATAL
2006
Springer
15 years 1 months ago
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should exte...
Rafal Leszczyna, Janusz Górski
EVOW
2010
Springer
15 years 4 months ago
Multi-Objective Probability Collectives
We describe and evaluate a multi-objective optimisation (MOO) algorithm that works within the Probability Collectives (PC) optimisation framework. PC is an alternative approach to ...
Antony Waldock, David Corne
GLVLSI
2007
IEEE
107views VLSI» more  GLVLSI 2007»
15 years 4 months ago
Side-channel resistant system-level design flow for public-key cryptography
In this paper, we propose a new design methodology to assess the risk for side-channel attacks, more specifically timing analysis and simple power analysis, at an early design st...
Kazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingr...
ASWEC
2006
IEEE
15 years 4 months ago
Assessing Security Properties of Software Components: A Software Engineer's Perspective
The paper proposes an assessment scheme for the security properties of software components. The proposed scheme consists of three stages: (i) a system-specific security requireme...
Khaled M. Khan, Jun Han