Sciweavers

17789 search results - page 55 / 3558
» Exceptional Use Cases
Sort
View
ACISP
2005
Springer
14 years 1 months ago
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two
We deal with a divisor class halving algorithm on hyperelliptic curve cryptosystems (HECC), which can be used for scalar multiplication, instead of a doubling algorithm. It is not ...
Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi
NETWORKING
2007
13 years 9 months ago
Multiple Identities in BitTorrent Networks
Abstract. Peer-to-peer (P2P) file sharing systems have become ubiquitous and at present the BitTorrent (BT) based P2P systems are very popular and successful. It has been argued t...
Jin Sun, Anirban Banerjee, Michalis Faloutsos
IJAC
2011
12 years 11 months ago
The Subword Reversing Method
We summarize the main known results involving subword reversing, a method of semigroup theory for constructing van Kampen diagrams by referring to a preferred direction. In good ca...
Patrick Dehornoy
CAISE
1997
Springer
13 years 12 months ago
Meta-CASE in Practice: a Case for KOGGE
Meta-CASE tools are used to generate CASE tools; KOGGE is such a meta-CASE system. Two of KOGGE's main objectives are adaptability and flexibility which address the growing ne...
Jürgen Ebert, Roger Süttenbach, Ingar Uh...
WER
2004
Springer
14 years 1 months ago
Constructing Use Case Model by Using a Systematic Approach: Description of a Study
This paper presents the results of a feasability study that was carried out to evaluate the construction of Use Case Models by comparing the models with groups that used the GUCCRA...
Anderson Belgamo, Sandra Camargo Pinto Ferraz Fabb...