Sciweavers

2027 search results - page 242 / 406
» When is it best to best-respond
Sort
View
DRM
2006
Springer
15 years 5 months ago
Proteus: virtualization for diversified tamper-resistance
Despite huge efforts by software providers, software protection mechanisms are still broken on a regular basis. Due to the current distribution model, an attack against one copy o...
Bertrand Anckaert, Mariusz H. Jakubowski, Ramarath...
ESA
2006
Springer
130views Algorithms» more  ESA 2006»
15 years 5 months ago
Robust, Generic and Efficient Construction of Envelopes of Surfaces in Three-Dimensional Spaces
Lower envelopes are fundamental structures in computational geometry, which have many applications, such as computing general Voronoi diagrams and performing hidden surface removal...
Michal Meyerovitch
EUC
2006
Springer
15 years 5 months ago
Dynamic Repartitioning of Real-Time Schedule on a Multicore Processor for Energy Efficiency
Multicore processors promise higher throughput at lower power consumption than single core processors. Thus in the near future they will be widely used in hard real-time systems as...
Euiseong Seo, Yongbon Koo, Joonwon Lee
FORMATS
2006
Springer
15 years 5 months ago
Integrating Discrete- and Continuous-Time Metric Temporal Logics Through Sampling
Abstract. Real-time systems usually encompass parts that are best described by a continuous-time model, such as physical processes under control, together with other components tha...
Carlo A. Furia, Matteo Rossi
FSE
2006
Springer
99views Cryptology» more  FSE 2006»
15 years 5 months ago
Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators
The main application of stream ciphers is online-encryption of arbitrarily long data, for example when transmitting speech data between a Bluetooth headset and a mobile GSM phone o...
Matthias Krause, Dirk Stegemann