Sciweavers

753 search results - page 21 / 151
» Fragments-based Model Reduction: Some Case Studies
Sort
View
CRYPTO
2004
Springer
108views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?
Many cryptographic primitives begin with parameter generation, which picks a primitive from a family. Such generation can use public coins (e.g., in the discrete-logarithm-based c...
Chun-Yuan Hsiao, Leonid Reyzin
DAGSTUHL
2003
13 years 10 months ago
Traceability and Evaluation in Scenario Analysis by Use Case Maps
The Use Case Map (UCM) scenario notation has some strong features related to rapid capture and evaluation of requirements models. In this paper, we explain how a UCM model was deve...
Dorin Bogdan Petriu, Daniel Amyot, C. Murray Woods...
LANMR
2007
13 years 10 months ago
Equivalence for the G3'-stable models semantics
Abstract We study the notion of strong equivalence between two disjunctive logic programs under the G3-stable model semantics, also called the P-stable semantics, and we show how s...
José Luis Carballido, José Arrazola,...
EJC
2000
13 years 10 months ago
User Interface Modelling with UML
Abstract. The Unified Modeling Language (UML) is a natural candidate for user interface (UI) modelling since it is the standard notation for object oriented modelling of applicatio...
Paulo Pinheiro da Silva, Norman W. Paton
BMCBI
2008
107views more  BMCBI 2008»
13 years 9 months ago
Multi-agent systems in epidemiology: a first step for computational biology in the study of vector-borne disease transmission
Background: Computational biology is often associated with genetic or genomic studies only. However, thanks to the increase of computational resources, computational models are ap...
Benjamin Roche, Jean-François Guégan...