Sciweavers

3652 search results - page 331 / 731
» A study of query length
Sort
View
134
Voted
CRYPTO
2012
Springer
254views Cryptology» more  CRYPTO 2012»
13 years 6 months ago
Breaking and Repairing GCM Security Proofs
Abstract. In this paper, we study the security proofs of GCM (Galois/Counter Mode of Operation). We first point out that a lemma, which is related to the upper bound on the probab...
Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu
292
Voted
SPIN
2012
Springer
13 years 6 months ago
Counterexample Explanation by Anomaly Detection
Since counterexamples generated by model checking tools are only symptoms of faults in the model, a significant amount of manual work is required in order to locate the fault that...
Stefan Leue, Mitra Tabaei Befrouei
CHI
2006
ACM
16 years 4 months ago
Tamil market: a spoken dialog system for rural India
In this paper, we describe the design process, results, and observations from a pilot user study for Tamil Market, a speech-driven agricultural query system, conducted in communit...
Madelaine Plauché, Madhu Prabaker
109
Voted
LICS
2009
IEEE
15 years 10 months ago
Trichotomy in the Complexity of Minimal Inference
We study the complexity of the propositional minimal inference problem. Its complexity has been extensively studied before because of its fundamental importance in artificial int...
Arnaud Durand, Miki Hermann, Gustav Nordh
121
Voted
MSR
2006
ACM
15 years 9 months ago
Concern based mining of heterogeneous software repositories
In the current trend of software engineering, software systems are viewed as clusters of overlapping structures representing various concerns, covering heterogeneous artifacts lik...
Imed Hammouda, Kai Koskimies