Sciweavers

1024 search results - page 141 / 205
» Value complete, column complete, predicate complete
Sort
View
WCRE
2003
IEEE
15 years 5 months ago
An Experimentation Framework for Evaluating Disassembly and Decompilation Tools for C++ and Java
The inherent differences between C++ and Java programs dictate that the methods used for reverse engineering their compiled executables will be languagespecific. This paper looks ...
Lori Vinciguerra, Linda M. Wills, Nidhi Kejriwal, ...
DAC
2003
ACM
15 years 5 months ago
Efficient compression and application of deterministic patterns in a logic BIST architecture
We present a novel method to efficiently generate, compress and apply test patterns in a logic BIST architecture. Patterns are generated by a modified automatic test pattern gener...
Peter Wohl, John A. Waicukauski, Sanjay Patel, Min...
SIGECOM
2003
ACM
154views ECommerce» more  SIGECOM 2003»
15 years 5 months ago
Exploring bidding strategies for market-based scheduling
A market-based scheduling mechanism allocates resources indexed by time to alternative uses based on the bids of participating agents. Agents are typically interested in multiple ...
Michael P. Wellman, Jeffrey K. MacKie-Mason, Danie...
ACNS
2003
Springer
147views Cryptology» more  ACNS 2003»
15 years 5 months ago
Side-Channel Attack on Substitution Blocks
1 We describe a side-channel attack on a substitution block, which is usually implemented as a table lookup operation. In particular, we have investigated smartcard implementations...
Roman Novak
FPL
2003
Springer
100views Hardware» more  FPL 2003»
15 years 5 months ago
Two Approaches for a Single-Chip FPGA Implementation of an Encryptor/Decryptor AES Core
In this paper we present a single-chip FPGA full encryptor/decryptor core design of the AES algorithm. Our design performs all of them, encryption, decryption and key scheduling pr...
Nazar A. Saqib, Francisco Rodríguez-Henr&ia...