Sciweavers

689 search results - page 58 / 138
» Encapsulation theory fundamentals
Sort
View
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
14 years 2 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
ATVA
2006
Springer
83views Hardware» more  ATVA 2006»
14 years 1 months ago
A Fresh Look at Testing for Asynchronous Communication
Testing is one of the fundamental techniques for verifying if a computing system conforms to its specification. We take a fresh look at the theory of testing for message-passing sy...
Puneet Bhateja, Paul Gastin, Madhavan Mukund
ICSE
2000
IEEE-ACM
14 years 1 months ago
Software economics: a roadmap
The fundamental goal of all good design and engineering is to create maximal value added for any given investment. There are many dimensions in which value can be assessed, from m...
Barry W. Boehm, Kevin J. Sullivan
ALT
2009
Springer
14 years 1 months ago
Learning and Domain Adaptation
Domain adaptation is a fundamental learning problem where one wishes to use labeled data from one or several source domains to learn a hypothesis performing well on a different, y...
Yishay Mansour
ATAL
2010
Springer
13 years 11 months ago
Collective argument evaluation as judgement aggregation
cting knowledge base can be seen abstractly as a set of arguments and a binary relation characterising conflict among them. There may be multiple plausible ways to evaluate confli...
Iyad Rahwan, Fernando Tohmé