A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Defining and Model Checking Abstractions of Complex Railway Models Using CSP||B
[chapter]
2013
Lecture Notes in Computer Science
Taylor from the company Invensys Rail for their support and encouraging feedback. ...
Let abs be an abstraction function from a concrete topology to an abstract topology. ...
The normal table or the reverse table of a route contain at least the points on this route (e.g., in Figure 2 route A1 topologically goes from signal S1 to signal S3, it includes the only point P1, and ...
doi:10.1007/978-3-642-39611-3_20
fatcat:hl2hzbp6sze4hj3sbbhtc6jhy4
Predictive Computational Models Of Complex Biological Systems: Antiarrhythmics And Cardiac Tissue Dynamics
2009
Biophysical Journal
General folding principles have emerged from studies on water-soluble proteins, but it is unclear how these ideas will translate to transmembrane proteins, which expose rather than hide their hydrophobic ...
Further information on the lipid parameters that influence folding is gained from studies in lipid-bilayer vesicles. ...
Assembly of LacY in the absence of PE results in topological inversion of its N-terminal half, which is largely reversed by postassembly synthesis of PE. ...
doi:10.1016/j.bpj.2008.12.1887
fatcat:oq66w372bneuhgnoxdnjr7oila
Hardware Watermarking for Finite State Machines, with Symmetric Circuit Encryption
[article]
2022
arXiv
pre-print
In circuitry, including additional circuitry that is hard to produce, one must contend with the prospect of increasing power consumption of the circuit, decreasing the speed of the circuit, and introducing ...
Our method uses an encryption technique to introduce secrets about the watermark circuit, at several levels. ...
Possibly the copier may have reverse-engineered an implementation of the device, and developed their own specification from that work. ...
arXiv:2203.12097v1
fatcat:jopygainefhxxglk6hic7thxpi
A Three-Dimensional Autonomous System with a Parabolic Equilibrium: Dynamical Analysis, Adaptive Synchronization via Relay Coupling, and Applications to Steganography and Chaos Encryption
2022
Complexity
By increasing the parameter a from 3.0 to 3.5, system (1) exhibits chaotic behavior followed by a reverse perioddoubling leading to period-1-oscillation as shown in Figure 1(c) . ...
Comparison of the results obtained from the analog circuit and numerical simulations showed good qualitative agreement. ...
doi:10.1155/2022/8362836
fatcat:bs32tmm2zzaxli3o5ftvgzlwma
Report on BCTCS 2015
2016
Bulletin of the European Association for Theoretical Computer Science
Abstracts for all of the talks from BCTCS 2015 are provided below. ...
Further details are available from the BCTCS website at www.bctcs.ac.uk. ...
reversibility. ...
dblp:journals/eatcs/Martin16
fatcat:qfrpdqewcfhh3o5fdgwsezrcqu
Advances in Logic Locking: Past, Present, and Prospects
[article]
2022
IACR Cryptology ePrint Archive
Logic locking primarily helps the designer to protect the IPs against reverse engineering, IP piracy, overproduction, and unauthorized activation. ...
Logic locking is a design concealment mechanism for protecting the IPs integrated into modern System-on-Chip (SoC) architectures from a wide range of hardware security threats at the IC manufacturing supply ...
, or IC under test, the functionality can be reverse-engineered. ...
dblp:journals/iacr/KamaliAFT22
fatcat:qnskge42g5emrlasquo7yugdv4
One-Time Programs with Limited Memory
[chapter]
2014
Lecture Notes in Computer Science
Instead, it is based on the following assumptions: (1) the total amount of data that can leak from the device is bounded, and (2) the total memory on the device (available both to the honest user and to ...
There are several works describing methods for hiding circuit topology [15, 18, 20] . ...
It is also a common problem in practical computer science to create software invulnerable to reverse engineering. ...
doi:10.1007/978-3-319-12087-4_24
fatcat:i25yit6r3famdnmwy64sypasdi
Fault-Based Test Case Generation for Component Connectors
2009
2009 Third IEEE International Symposium on Theoretical Aspects of Software Engineering
For connectors, faults are caused by possible errors during the development process, such as wrongly used channels, missing or redundant subcircuits, or circuits with wrongly constructed topology. ...
In this paper, we present a fault-based method to generate test cases for component connectors from specifications. ...
The hiding operation is used to hide the internal topology of a component connector. The hidden (mixed) nodes can no longer be accessed or observed from outside. ...
doi:10.1109/tase.2009.14
dblp:conf/tase/AichernigAAB0R09
fatcat:ina5xkmvxbbcnbxxvyeo2uykli
Software radio architecture: a mathematical perspective
1999
IEEE Journal on Selected Areas in Communications
As the software radio makes its transition from research to practice, it becomes increasingly important to establish provable properties of the software radio architecture on which product developers and ...
Understanding the topological properties of the software radio architecture promotes plug-and-play applications and cost-effective reuse. ...
From a radio engineering perspective, the communications device must first encode the information from the source into a suitable electronic representation. ...
doi:10.1109/49.761033
fatcat:lys4vi3tobgm5kbphoewvjery4
Cryptographic Reverse Firewalls
[chapter]
2015
Lecture Notes in Computer Science
To that end, we introduce the notion of a cryptographic reverse firewall (RF). ...
Along the way, we design an oblivious transfer protocol that also has a secure RF for each party, and a rerandomizable garbled circuit that is both more efficient and more secure than previous constructions ...
Informally, their circuit is rerandomizable when constructed honestly, but the rerandomization of a dishonestly constructed circuit can easily be distinguished from a freshly garbled circuit. ...
doi:10.1007/978-3-662-46803-6_22
fatcat:x2r4uysi7fb4ldpnlucmoke2ay
Modeling scalable pattern generation in DNA reaction networks
2013
Natural Computing
This includes socalled strand displacement reactions in which one singlestranded DNA hybridizes to a hemi-duplex DNA and displaces another single stranded DNA, reversibly or irreversibly. ...
Acknowledgments This work was funded by the National Institute of Health (1 R01 GM094933 and 1 F32 GM095280), and the National Security Science and Engineering Faculty Fellowship (FA9550-10-1-0169). ...
We envision that the species in such circuits (including amplifiers, thresholds and logic gates) could will dynamically modulate diffusivity by alternately exposing or hiding diffusion-modifying sequences ...
doi:10.1007/s11047-013-9392-7
pmid:25506295
pmcid:PMC4261192
fatcat:r2b2iovogveg7fcwlaye4564nq
Modeling Scalable Pattern Generation in DNA Reaction Networks
2012
Artificial Life 13
This includes socalled strand displacement reactions in which one singlestranded DNA hybridizes to a hemi-duplex DNA and displaces another single stranded DNA, reversibly or irreversibly. ...
Acknowledgments This work was funded by the National Institute of Health (1 R01 GM094933 and 1 F32 GM095280), and the National Security Science and Engineering Faculty Fellowship (FA9550-10-1-0169). ...
We envision that the species in such circuits (including amplifiers, thresholds and logic gates) could will dynamically modulate diffusivity by alternately exposing or hiding diffusion-modifying sequences ...
doi:10.7551/978-0-262-31050-5-ch058
dblp:conf/alife/AllenCSE12
fatcat:b4suaz3v55b3debpz3mr7sx2gi
On-chip interconnects and instruction steering schemes for clustered microarchitectures
2005
IEEE Transactions on Parallel and Distributed Systems
This new class of interconnects has demands and characteristics different from traditional multiprocessor networks. ...
circuit technology and design. ...
During an even cycle, the allowed directions are reversed. ...
doi:10.1109/tpds.2005.23
fatcat:d653755qevf45gtiibunn3rwxi
Petri Net Based Model Validation in Systems Biology
[chapter]
2004
Lecture Notes in Computer Science
All these qualitative models are based on more or less graphtheoretical descriptions of the system topology, which are defined in case of stoichiometric models by the known stoichiometric equations. ...
Reversible reactions are modelled by macro transitions, i.e. by hierarchical nodes, hiding the forward and backward reactions. ...
We are going to apply this notation to abstract from the two directions of reversible reactions and to abstract from purely linear reaction sequences. ...
doi:10.1007/978-3-540-27793-4_13
fatcat:cekiclrstzdffbbfid7b7he3ze
Stacking Sigmas: A Framework to Compose Σ-Protocols for Disjunctions
[article]
2021
IACR Cryptology ePrint Archive
However, these techniques do not appear to generalize beyond garbled circuits. In this work, we focus on achieving the best of both worlds. ...
[EC'20] exploited special properties of garbled circuits to construct efficient ZK proofs for disjunctions, where the proof size is only proportional to the length of the largest clause in the disjunction ...
While not possible for all Σ-protocols, simulating in this way-i.e., by first selecting a third round message and then "reverse engineering" the appropriate first round message-is actually a common simulation ...
dblp:journals/iacr/Goel0HK21
fatcat:3z73ddvlhrbc3nysguq5zl3bpm
« Previous
Showing results 1 — 15 out of 483 results