Sciweavers

1116 search results - page 186 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
ENTCS
2006
101views more  ENTCS 2006»
13 years 7 months ago
Mumbo: A Rule-Based Implementation of a Run-time Program Generation Language
We describe our efforts to use rule-based programming to produce a model of Jumbo, a run-time program generation (RTPG) system for Java. Jumbo incorporates RTPG following the simp...
Baris Aktemur, Samuel N. Kamin
SQJ
2008
74views more  SQJ 2008»
13 years 7 months ago
Quantitatively measuring object-oriented couplings
Abstract. One key to several quality factors of software is the way components are connected. Software coupling can be used to estimate a number of quality factors, including maint...
Jeff Offutt, Aynur Abdurazik, Stephen R. Schach
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
12 years 3 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
ICIP
2001
IEEE
14 years 9 months ago
The curvelet transform for image denoising
We describe approximate digital implementations of two new mathematical transforms, namely, the ridgelet transform [3] and the curvelet transform [7, 6]. Our implementations offer...
Emmanuel J. Candès
RECOMB
2005
Springer
14 years 8 months ago
Information Theoretic Approaches to Whole Genome Phylogenies
We describe a novel method for efficient reconstruction of phylogenetic trees, based on sequences of whole genomes or proteomes, whose lengths may greatly vary. The core of our me...
David Burstein, Igor Ulitsky, Tamir Tuller, Benny ...