Sciweavers

115 search results - page 11 / 23
» A rigorous view on neutrality
Sort
View
WER
2005
Springer
14 years 3 months ago
Using Task Descriptions for the Specification of Web Application Requirements
There are a significant number of proposals for modelling and developing Web Applications, but very few of them state rigorously how to elicit and represent requirements, and how t...
Pedro Valderas, Joan Fons, Vicente Pelechano
ASIACRYPT
2004
Springer
14 years 3 months ago
How Far Can We Go Beyond Linear Cryptanalysis?
Abstract. Several generalizations of linear cryptanalysis have been proposed in the past, as well as very similar attacks in a statistical point of view. In this paper, we define ...
Thomas Baignères, Pascal Junod, Serge Vaude...
DEXAW
2003
IEEE
93views Database» more  DEXAW 2003»
14 years 3 months ago
A business process-driven approach to security engineering
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical ...
Antonio Mana, José A. Montenegro, Carsten R...
COLT
2000
Springer
14 years 2 months ago
Computable Shell Decomposition Bounds
Haussler, Kearns, Seung and Tishby introduced the notion of a shell decomposition of the union bound as a means of understanding certain empirical phenomena in learning curves suc...
John Langford, David A. McAllester
ECBS
1997
IEEE
144views Hardware» more  ECBS 1997»
14 years 2 months ago
An analysis of the Ariane 5 flight 501 failure-a system engineering perspective
The report issued by the Inquiry Board in charge of inspecting the Ariane 5 flight 501 failure concludes that causes of the failure are rooted into poor S/W Engineering practice. ...
Gérard Le Lann