Sciweavers

5639 search results - page 449 / 1128
» Timed Abstract Non-interference
Sort
View
ICGI
2004
Springer
15 years 10 months ago
Identifying Left-Right Deterministic Linear Languages
Abstract. Left deteministic linear languages are a subclass of the context free languages that includes all the regular languages. Recently was proposed an algorithm to identify in...
Jorge Calera-Rubio, José Oncina
WDAG
2004
Springer
144views Algorithms» more  WDAG 2004»
15 years 10 months ago
Contention-Free MAC Protocols for Wireless Sensor Networks
Abstract. A MAC protocol specifies how nodes in a sensor network access a shared communication channel. Desired properties of such MAC protocol are: it should be distributed and c...
Costas Busch, Malik Magdon-Ismail, Fikret Sivrikay...
COOPIS
2003
IEEE
15 years 10 months ago
A Fuzzy Model for Representing Uncertain, Subjective, and Vague Temporal Knowledge in Ontologies
Abstract. Time modeling is a crucial feature in many application domains. However, temporal information often is not crisp, but is uncertain, subjective and vague. This is particul...
Gábor Nagypál, Boris Motik
CIAC
2003
Springer
145views Algorithms» more  CIAC 2003»
15 years 10 months ago
Additive Spanners for k-Chordal Graphs
Abstract. In this paper we show that every chordal graph with n vertices and m edges admits an additive 4-spanner with at most 2n−2 edges and an additive 3-spanner with at most O...
Victor Chepoi, Feodor F. Dragan, Chenyu Yan
FC
2003
Springer
171views Cryptology» more  FC 2003»
15 years 10 months ago
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)
Abstract. In this paper we describe several fault attacks on the Advanced Encryption Standard (AES). First, using optical/eddy current fault induction attacks as recently publicly ...
Johannes Blömer, Jean-Pierre Seifert