Sciweavers

35419 search results - page 6903 / 7084
» How are we doing
Sort
View
PKC
2005
Springer
167views Cryptology» more  PKC 2005»
15 years 9 months ago
Converse Results to the Wiener Attack on RSA
A well-known attack on RSA with low secret-exponent d was given by Wiener about 15 years ago. Wiener showed that using continued fractions, one can efficiently recover the secret-...
Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef...
SAFECOMP
2005
Springer
15 years 9 months ago
Are High-Level Languages Suitable for Robust Telecoms Software?
In the telecommunications sector product development must minimise time to market while delivering high levels of dependability, availability, maintainability and scalability. High...
Jan Henry Nyström, Philip W. Trinder, David J...
TACAS
2005
Springer
113views Algorithms» more  TACAS 2005»
15 years 9 months ago
jETI: A Tool for Remote Tool Integration
Abstract. We present jETI, a redesign of the Electronic Tools Integration platform (ETI), that addresses the major issues and concerns accumulated over seven years of experience wi...
Tiziana Margaria, Ralf Nagel, Bernhard Steffen
UML
2005
Springer
15 years 9 months ago
Reliability Prediction in Model-Driven Development
Abstract. Evaluating the implications of an architecture design early in the software development lifecycle is important in order to reduce costs of development. Reliability is an ...
Genaína Nunes Rodrigues, David S. Rosenblum...
DAC
2004
ACM
15 years 9 months ago
Extending the transaction level modeling approach for fast communication architecture exploration
System-on-Chip (SoC) designs are increasingly becoming more complex. Efficient on-chip communication architectures are critical for achieving desired performance in these systems....
Sudeep Pasricha, Nikil D. Dutt, Mohamed Ben-Romdha...
« Prev « First page 6903 / 7084 Last » Next »