Sciweavers

887 search results - page 110 / 178
» A Time for Choosing
Sort
View
CTRSA
2007
Springer
153views Cryptology» more  CTRSA 2007»
14 years 2 months ago
Differential Power Analysis of Stream Ciphers
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream cipher...
Wieland Fischer, Berndt M. Gammel, O. Kniffler, J....
COCOA
2009
Springer
14 years 2 months ago
Positive Influence Dominating Set in Online Social Networks
Online social network has developed significantly in recent years as a medium of communicating, sharing and disseminating information and spreading influence. Most of current resea...
Feng Wang 0002, Erika Camacho, Kuai Xu
ACSC
2004
IEEE
14 years 1 months ago
Flexible Layering in Hierarchical Drawings with Nodes of Arbitrary Size
Graph drawing is an important area of information visualization which concerns itself with the visualization of relational data structures. Relational data like networks, hierarch...
Carsten Friedrich, Falk Schreiber
APN
2006
Springer
14 years 1 months ago
Nested Nets for Adaptive Systems
We consider nested nets, i.e. Petri nets in which tokens can be Petri nets themselves. We study value semantics of nested nets rather than reference semantics, and apply nested ne...
Kees M. van Hee, Irina A. Lomazova, Olivia Oanea, ...
ASWEC
2006
IEEE
14 years 1 months ago
Requirements Capture and Specification for Enterprise Applications: a UML Based Attempt
We propose a software development method for enterprise applications that combines the use of the structural concepts provided by problem frames, and the use of the UML notation. ...
Christine Choppy, Gianna Reggio