Sciweavers

2781 search results - page 448 / 557
» System Modules
Sort
View
CCS
2011
ACM
13 years 10 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...
TVCG
2012
167views Hardware» more  TVCG 2012»
13 years 11 days ago
Wellformedness Properties in Euler Diagrams: Which Should Be Used?
— Euler diagrams are often used to visualize intersecting data sets in applications such as criminology; genetics, medicine and computer file systems. One interesting aspect of t...
Peter Rodgers, Leishi Zhang, Helen C. Purchase
APLAS
2006
ACM
15 years 3 months ago
Scheme with Classes, Mixins, and Traits
Abstract. The Scheme language report advocates language design as the composition of a small set of orthogonal constructs, instead of a large accumulation of features. In this pape...
Matthew Flatt, Robert Bruce Findler, Matthias Fell...
FUIN
2008
119views more  FUIN 2008»
14 years 10 months ago
Modeling Communication with Synchronized Environments
A deterministic behavior of systems composed of several modules is a desirable design goal. Assembling a complex system from components requires also a high degree of re-usability....
Tiberiu Seceleanu, Axel Jantsch
OOPSLA
2009
Springer
15 years 4 months ago
Thorn: robust, concurrent, extensible scripting on the JVM
Scripting languages enjoy great popularity due their support for rapid and exploratory development. They typically have lightweight syntax, weak data privacy, dynamic typing, powe...
Bard Bloom, John Field, Nathaniel Nystrom, Johan &...