Sciweavers

5639 search results - page 842 / 1128
» Timed Abstract Non-interference
Sort
View
WISA
2004
Springer
15 years 9 months ago
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
Abstract. Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against trafï...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
ISQED
2010
IEEE
137views Hardware» more  ISQED 2010»
15 years 9 months ago
Automated silicon debug data analysis techniques for a hardware data acquisition environment
Abstract—Silicon debug poses a unique challenge to the engineer because of the limited access to internal signals of the chip. Embedded hardware such as trace buffers helps overc...
Yu-Shen Yang, Brian Keng, Nicola Nicolici, Andreas...
AGP
2003
IEEE
15 years 9 months ago
An Evolving Agent with EVOLP
Abstract. Logic programming has often been considered less than adequate for modelling the dynamics of knowledge changing over time. Evolving Logic Programs (EVOLP) has been recent...
José Júlio Alferes, Antonio Brogi, J...
BIBE
2003
IEEE
15 years 9 months ago
An Investigation of Phylogenetic Likelihood Methods
Abstract— We analyze the performance of likelihoodbased approaches used to reconstruct phylogenetic trees. Unlike other techniques such as Neighbor-Joining (NJ) and Maximum Parsi...
Tiffani L. Williams, Bernard M. E. Moret
CCGRID
2003
IEEE
15 years 9 months ago
RelayCast: A Middleware for Application-level Multicast Services
Application-level multicast (ALM) is being increasingly recognized as a solution to support multipoint applications without the need for a network layer multicast protocol. Though...
Nodoka Mimura, Kiyohide Nakauchi, Hiroyuki Morikaw...