Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Conference Proceeding
|
![]() |
Java Pathfinder at SV-COMP 2019 (Competition Contribution)Artho, Cyrille ; Visser, W.25th International Conference on Tools and Algorithms for the Construction and Analysis of Systems conference series, TACAS 2019 held as part of the 22nd European Joint Conferences on Theory and Practice of Software, ETAPS 2019, 2019, p.224 [Peer Reviewed Journal]Full text available |
2 |
Material Type: Book Chapter
|
![]() |
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge SecurityAttrapadung, Nuttapong ; Hanaoka, Goichiro ; Yamada, ShotaInformation and Communications Security, 2015, Vol.8958, p.176-190 [Peer Reviewed Journal]Switzerland: Springer International Publishing AGFull text available |
3 |
Material Type: Conference Proceeding
|
![]() |
Parallel H.264 decoding on an embedded multicore processorAzevedo, Arnaldo ; Meenderinck, Cor ; Juurlink, Ben ; Terechko, Andrei ; Hoogerbrugge, Jan ; Álvarez Mesa, Mauricio ; Ramírez Bellido, AlejandroSpringer-Verlag, Berlin, Heidelberg 2009Full text available |
4 |
Material Type: Book Chapter
|
![]() |
DDoS Attacks Detection in Cloud Computing Using Data Mining TechniquesBorisenko, Konstantin ; Smirnov, Andrey ; Novikova, Evgenia ; Shorov, AndreyAdvances in Data Mining. Applications and Theoretical Aspects, 2016, Vol.9728, p.197-211 [Peer Reviewed Journal]Switzerland: Springer International Publishing AGFull text available |
5 |
Material Type: Book Chapter
|
![]() |
Immunotronics : Hardware Fault Tolerance Inspired by the Immune SystemBradley, D. W. ; Tyrrell, A. M.Evolvable Systems: From Biology to Hardware, 2000, Vol.1801, p.11-20 [Peer Reviewed Journal]Germany: Springer Berlin / HeidelbergFull text available |
6 |
Material Type: Book Chapter
|
![]() |
Limit Behavior of the Multi-agent Rotor-Router SystemChalopin, Jérémie ; Das, Shantanu ; Gawrychowski, Paweł ; Kosowski, Adrian ; Labourel, Arnaud ; Uznański, PrzemysławDistributed Computing, 2015, Vol.9363, p.123-139 [Peer Reviewed Journal]Germany: Springer Berlin / HeidelbergFull text available |
7 |
Material Type: Book Chapter
|
![]() |
Cryptanalysis of Midori128 Using Impossible Differential TechniquesChen, Zhan ; Chen, Huaifeng ; Wang, XiaoyunInformation Security Practice and Experience, 2016, Vol.10060, p.1-12 [Peer Reviewed Journal]Switzerland: Springer International Publishing AGFull text available |
8 |
Material Type: Book Chapter
|
![]() |
Stable Leader Election in Population Protocols Requires Linear TimeDoty, David ; Soloveichik, DavidDistributed Computing, 2015, Vol.9363, p.602-616 [Peer Reviewed Journal]Germany: Springer Berlin / HeidelbergFull text available |
9 |
Material Type: Book Chapter
|
![]() |
A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a CountermeasureEndo, Sho ; Homma, Naofumi ; Hayashi, Yu-ichi ; Takahashi, Junko ; Fuji, Hitoshi ; Aoki, TakafumiConstructive Side-Channel Analysis and Secure Design, 2014, Vol.8622, p.214-228 [Peer Reviewed Journal]Switzerland: Springer International Publishing AGFull text available |
10 |
Material Type: Book Chapter
|
![]() |
A goal-oriented approach for the generation and evaluation of alternative architecturesGrau Colom, Gemma ; Franch Gutiérrez, JavierSpringer 2007Full text available |