Sciweavers

3674 search results - page 696 / 735
» Information Dependencies
Sort
View
FSE
1998
Springer
137views Cryptology» more  FSE 1998»
14 years 29 days ago
Differential Cryptanalysis of the ICE Encryption Algorithm
ICE is a 64-bit block cipher presented at the Fast Software Encryption Workshop in January 1997. It introduced the concept of a keyed permutation to improve the resistance against ...
Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen
CHI
1997
ACM
14 years 28 days ago
MOBI-D: A Model-Based Development Environment for User-Centered Design
MOBI-D (Model-Based Interface Designer) is a software environment the design and development of user interfaces from declarative interface models. End-users informally describe ta...
Angel R. Puerta, David Maulsby
SIGMOD
1997
ACM
131views Database» more  SIGMOD 1997»
14 years 27 days ago
Maintenance of Data Cubes and Summary Tables in a Warehouse
Data warehouses contain large amounts of information, often collected from a variety of independent sources. Decision-support functions in a warehouse, such as on-line analytical ...
Inderpal Singh Mumick, Dallan Quass, Barinderpal S...
SIGCOMM
1996
ACM
14 years 26 days ago
Internet Mobility 4x4
Mobile IP protocols allow mobile hosts to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment ...
Stuart Cheshire, Mary Baker
OOPSLA
1997
Springer
14 years 26 days ago
Composite Design Patterns
ed Abstract Factory is yet another. When patterns cooperate, the cooperation itself can give rise to problems, contexts, trade-offs, and consequences. For instance, should a Visito...
Dirk Riehle