Sciweavers

2913 search results - page 126 / 583
» How Much to Copy
Sort
View
NDSS
1997
IEEE
14 years 2 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin
SSR
1997
87views more  SSR 1997»
13 years 11 months ago
Components, Frameworks, Patterns
Frameworks are an object-oriented reuse technique that are widely used in industry but not discussed much by the software engineering research community. They are a way of reusing...
Ralph E. Johnson
ICDE
2008
IEEE
132views Database» more  ICDE 2008»
14 years 11 months ago
Merging Hierarchies Using Object Placement
The main challenge in integrating two hierarchies is determining the correspondence between the nodes and edges of each hierarchy. Traditionally, the correspondence is determined ...
Kai Zhao, Robert Ikeda, Hector Garcia-Molina
DAGSTUHL
2006
13 years 11 months ago
Clone Detector Use Questions: A List of Desirable Empirical Studies
Abstract. Code "clones" are similar segments of code that are frequently introduced by "scavenging" existing code, that is, reusing code by copying it and adapt...
Thomas R. Dean, Massimiliano Di Penta, Kostas Kont...
CALCO
2011
Springer
205views Mathematics» more  CALCO 2011»
12 years 10 months ago
Bases as Coalgebras
Abstract. The free algebra adjunction, between the category of algebras of a monad and the underlying category, induces a comonad on the category of algebras. The coalgebras of thi...
Bart Jacobs