Sciweavers

286 search results - page 6 / 58
» Crypto Engineering: Some History and Some Case Studies
Sort
View
ICSE
2001
IEEE-ACM
14 years 1 days ago
Case Study: Extreme Programming in a University Environment
Extreme Programming (XP) is a new and controversial sojiware processfor small teams. A practical training courseat the universityof Karlsruheled to thefollowing observations about...
Matthias M. Müller, Walter F. Tichy
APSEC
2003
IEEE
14 years 27 days ago
Case study: Reconnaissance techniques to support feature location using RECON2
Change requests are often formulated into concepts or features that a maintainer can understand. One of the main issues faced by a maintainer is to know and locate “where does t...
Suhaimi Ibrahim, Norbik Bashah Idris, Aziz Deraman
CRYPTO
2004
Springer
108views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?
Many cryptographic primitives begin with parameter generation, which picks a primitive from a family. Such generation can use public coins (e.g., in the discrete-logarithm-based c...
Chun-Yuan Hsiao, Leonid Reyzin
ISESE
2003
IEEE
14 years 27 days ago
Observational Studies to Accelerate Process Experience in Classroom Studies: An Evaluation
Software Engineering studies run in classroom environments can and have made important contributions to empirical software engineering. Because the goal of such studies is to impr...
Jeffrey Carver, Forrest Shull, Victor R. Basili
FM
2003
Springer
136views Formal Methods» more  FM 2003»
14 years 25 days ago
Improving Safety Assessment of Complex Systems: An Industrial Case Study
The complexity of embedded controllers is steadily increasing. This trend, stimulated by the continuous improvement of the computational power of hardware, demands for a correspond...
Marco Bozzano, Antonella Cavallo, Massimo Cifaldi,...