Filters








483 Hits in 3.5 sec

Defining and Model Checking Abstractions of Complex Railway Models Using CSP||B [chapter]

Faron Moller, Hoang Nga Nguyen, Markus Roggenbach, Steve Schneider, Helen Treharne
2013 Lecture Notes in Computer Science  
Taylor from the company Invensys Rail for their support and encouraging feedback.  ...  Let abs be an abstraction function from a concrete topology to an abstract topology.  ...  The normal table or the reverse table of a route contain at least the points on this route (e.g., in Figure 2 route A1 topologically goes from signal S1 to signal S3, it includes the only point P1, and  ... 
doi:10.1007/978-3-642-39611-3_20 fatcat:hl2hzbp6sze4hj3sbbhtc6jhy4

Predictive Computational Models Of Complex Biological Systems: Antiarrhythmics And Cardiac Tissue Dynamics

Colleen E. Clancy
2009 Biophysical Journal  
General folding principles have emerged from studies on water-soluble proteins, but it is unclear how these ideas will translate to transmembrane proteins, which expose rather than hide their hydrophobic  ...  Further information on the lipid parameters that influence folding is gained from studies in lipid-bilayer vesicles.  ...  Assembly of LacY in the absence of PE results in topological inversion of its N-terminal half, which is largely reversed by postassembly synthesis of PE.  ... 
doi:10.1016/j.bpj.2008.12.1887 fatcat:oq66w372bneuhgnoxdnjr7oila

Hardware Watermarking for Finite State Machines, with Symmetric Circuit Encryption [article]

James Gil de Lamadrid, Seonho Choi
2022 arXiv   pre-print
In circuitry, including additional circuitry that is hard to produce, one must contend with the prospect of increasing power consumption of the circuit, decreasing the speed of the circuit, and introducing  ...  Our method uses an encryption technique to introduce secrets about the watermark circuit, at several levels.  ...  Possibly the copier may have reverse-engineered an implementation of the device, and developed their own specification from that work.  ... 
arXiv:2203.12097v1 fatcat:jopygainefhxxglk6hic7thxpi

A Three-Dimensional Autonomous System with a Parabolic Equilibrium: Dynamical Analysis, Adaptive Synchronization via Relay Coupling, and Applications to Steganography and Chaos Encryption

Janarthanan Ramadoss, Romanic Kengne, Dianorré Tokoue Ngatcha, Victor Kamdoum Tamba, Karthikeyan Rajagopal, Marceline Motchongom Tingue, Mustafa Cagri Kutlu
2022 Complexity  
By increasing the parameter a from 3.0 to 3.5, system (1) exhibits chaotic behavior followed by a reverse perioddoubling leading to period-1-oscillation as shown in Figure 1(c) .  ...  Comparison of the results obtained from the analog circuit and numerical simulations showed good qualitative agreement.  ... 
doi:10.1155/2022/8362836 fatcat:bs32tmm2zzaxli3o5ftvgzlwma

Report on BCTCS 2015

Barnaby Martin
2016 Bulletin of the European Association for Theoretical Computer Science  
Abstracts for all of the talks from BCTCS 2015 are provided below.  ...  Further details are available from the BCTCS website at www.bctcs.ac.uk.  ...  reversibility.  ... 
dblp:journals/eatcs/Martin16 fatcat:qfrpdqewcfhh3o5fdgwsezrcqu

Advances in Logic Locking: Past, Present, and Prospects [article]

Hadi Mardani Kamali, Kimia Zamiri Azar, Farimah Farahmandi, Mark M. Tehranipoor
2022 IACR Cryptology ePrint Archive  
Logic locking primarily helps the designer to protect the IPs against reverse engineering, IP piracy, overproduction, and unauthorized activation.  ...  Logic locking is a design concealment mechanism for protecting the IPs integrated into modern System-on-Chip (SoC) architectures from a wide range of hardware security threats at the IC manufacturing supply  ...  , or IC under test, the functionality can be reverse-engineered.  ... 
dblp:journals/iacr/KamaliAFT22 fatcat:qnskge42g5emrlasquo7yugdv4

One-Time Programs with Limited Memory [chapter]

Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zaja̧c
2014 Lecture Notes in Computer Science  
Instead, it is based on the following assumptions: (1) the total amount of data that can leak from the device is bounded, and (2) the total memory on the device (available both to the honest user and to  ...  There are several works describing methods for hiding circuit topology [15, 18, 20] .  ...  It is also a common problem in practical computer science to create software invulnerable to reverse engineering.  ... 
doi:10.1007/978-3-319-12087-4_24 fatcat:i25yit6r3famdnmwy64sypasdi

Fault-Based Test Case Generation for Component Connectors

Bernhard K. Aichernig, Farhad Arbab, Lacramioara Astefanoaei, Frank S. de Boer, Meng Sun, Jan Rutten
2009 2009 Third IEEE International Symposium on Theoretical Aspects of Software Engineering  
For connectors, faults are caused by possible errors during the development process, such as wrongly used channels, missing or redundant subcircuits, or circuits with wrongly constructed topology.  ...  In this paper, we present a fault-based method to generate test cases for component connectors from specifications.  ...  The hiding operation is used to hide the internal topology of a component connector. The hidden (mixed) nodes can no longer be accessed or observed from outside.  ... 
doi:10.1109/tase.2009.14 dblp:conf/tase/AichernigAAB0R09 fatcat:ina5xkmvxbbcnbxxvyeo2uykli

Software radio architecture: a mathematical perspective

J. Mitola
1999 IEEE Journal on Selected Areas in Communications  
As the software radio makes its transition from research to practice, it becomes increasingly important to establish provable properties of the software radio architecture on which product developers and  ...  Understanding the topological properties of the software radio architecture promotes plug-and-play applications and cost-effective reuse.  ...  From a radio engineering perspective, the communications device must first encode the information from the source into a suitable electronic representation.  ... 
doi:10.1109/49.761033 fatcat:lys4vi3tobgm5kbphoewvjery4

Cryptographic Reverse Firewalls [chapter]

Ilya Mironov, Noah Stephens-Davidowitz
2015 Lecture Notes in Computer Science  
To that end, we introduce the notion of a cryptographic reverse firewall (RF).  ...  Along the way, we design an oblivious transfer protocol that also has a secure RF for each party, and a rerandomizable garbled circuit that is both more efficient and more secure than previous constructions  ...  Informally, their circuit is rerandomizable when constructed honestly, but the rerandomization of a dishonestly constructed circuit can easily be distinguished from a freshly garbled circuit.  ... 
doi:10.1007/978-3-662-46803-6_22 fatcat:x2r4uysi7fb4ldpnlucmoke2ay

Modeling scalable pattern generation in DNA reaction networks

Peter B. Allen, Xi Chen, Zack B. Simpson, Andrew D. Ellington
2013 Natural Computing  
This includes socalled strand displacement reactions in which one singlestranded DNA hybridizes to a hemi-duplex DNA and displaces another single stranded DNA, reversibly or irreversibly.  ...  Acknowledgments This work was funded by the National Institute of Health (1 R01 GM094933 and 1 F32 GM095280), and the National Security Science and Engineering Faculty Fellowship (FA9550-10-1-0169).  ...  We envision that the species in such circuits (including amplifiers, thresholds and logic gates) could will dynamically modulate diffusivity by alternately exposing or hiding diffusion-modifying sequences  ... 
doi:10.1007/s11047-013-9392-7 pmid:25506295 pmcid:PMC4261192 fatcat:r2b2iovogveg7fcwlaye4564nq

Modeling Scalable Pattern Generation in DNA Reaction Networks

Peter B. Allen, Xi Chen, Zack B. Simpson, Andrew D. Ellington
2012 Artificial Life 13  
This includes socalled strand displacement reactions in which one singlestranded DNA hybridizes to a hemi-duplex DNA and displaces another single stranded DNA, reversibly or irreversibly.  ...  Acknowledgments This work was funded by the National Institute of Health (1 R01 GM094933 and 1 F32 GM095280), and the National Security Science and Engineering Faculty Fellowship (FA9550-10-1-0169).  ...  We envision that the species in such circuits (including amplifiers, thresholds and logic gates) could will dynamically modulate diffusivity by alternately exposing or hiding diffusion-modifying sequences  ... 
doi:10.7551/978-0-262-31050-5-ch058 dblp:conf/alife/AllenCSE12 fatcat:b4suaz3v55b3debpz3mr7sx2gi

On-chip interconnects and instruction steering schemes for clustered microarchitectures

J.-M. Parcerisa, J. Sahuquillo, A. Gonzalez, J. Duato
2005 IEEE Transactions on Parallel and Distributed Systems  
This new class of interconnects has demands and characteristics different from traditional multiprocessor networks.  ...  circuit technology and design.  ...  During an even cycle, the allowed directions are reversed.  ... 
doi:10.1109/tpds.2005.23 fatcat:d653755qevf45gtiibunn3rwxi

Petri Net Based Model Validation in Systems Biology [chapter]

Monika Heiner, Ina Koch
2004 Lecture Notes in Computer Science  
All these qualitative models are based on more or less graphtheoretical descriptions of the system topology, which are defined in case of stoichiometric models by the known stoichiometric equations.  ...  Reversible reactions are modelled by macro transitions, i.e. by hierarchical nodes, hiding the forward and backward reactions.  ...  We are going to apply this notation to abstract from the two directions of reversible reactions and to abstract from purely linear reaction sequences.  ... 
doi:10.1007/978-3-540-27793-4_13 fatcat:cekiclrstzdffbbfid7b7he3ze

Stacking Sigmas: A Framework to Compose Σ-Protocols for Disjunctions [article]

Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk
2021 IACR Cryptology ePrint Archive  
However, these techniques do not appear to generalize beyond garbled circuits. In this work, we focus on achieving the best of both worlds.  ...  [EC'20] exploited special properties of garbled circuits to construct efficient ZK proofs for disjunctions, where the proof size is only proportional to the length of the largest clause in the disjunction  ...  While not possible for all Σ-protocols, simulating in this way-i.e., by first selecting a third round message and then "reverse engineering" the appropriate first round message-is actually a common simulation  ... 
dblp:journals/iacr/Goel0HK21 fatcat:3z73ddvlhrbc3nysguq5zl3bpm
« Previous Showing results 1 — 15 out of 483 results