Sciweavers

692 search results - page 133 / 139
» Understanding Finiteness Analysis Using Abstract Interpretat...
Sort
View
VIZSEC
2007
Springer
15 years 5 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
ICCAD
1997
IEEE
76views Hardware» more  ICCAD 1997»
15 years 4 months ago
Simulation methods for RF integrated circuits
Abstract — The principles employed in the development of modern RF simulators are introduced and the various techniques currently in use, or expected to be in use in the next few...
Kenneth S. Kundert
EMSOFT
2008
Springer
15 years 1 months ago
Automatically transforming and relating Uppaal models of embedded systems
Relations between models are important for effective automatic validation, for comparing implementations with specifications, and for increased understanding of embedded systems d...
Timothy Bourke, Arcot Sowmya
ICISC
1998
110views Cryptology» more  ICISC 1998»
15 years 1 months ago
The nonhomomorphicity of S-boxes
Abstract. In this paper, we introduce the concept of kth-order nonhomomorphicity of mappings or S-boxes as an alternative indicator that forecasts nonlinearity characteristics of a...
Yuliang Zheng, Xian-Mo Zhang
89
Voted
SIAMSC
2008
126views more  SIAMSC 2008»
14 years 11 months ago
Towards a Statistical Theory of Texture Evolution in Polycrystals
Abstract. Most technologically useful materials possess polycrystalline microstructures composed of a large number of small monocrystalline grains separated by grain boundaries. Th...
K. Barmak, M. Emelianenko, Dmitry Golovaty, David ...