Sciweavers

2208 search results - page 44 / 442
» Memory Practices in the Sciences
Sort
View
SACRYPT
2009
Springer
162views Cryptology» more  SACRYPT 2009»
14 years 3 months ago
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384
Abstract. In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complementation of whole registers turns out to be very useful for constructing...
Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, S...
CC
2003
Springer
102views System Software» more  CC 2003»
14 years 2 months ago
Precision in Practice: A Type-Preserving Java Compiler
Popular mobile code architectures (Java and .NET) include verifiers to check for memory safety and other security properties. Since their formats are relatively high level, suppor...
Christopher League, Zhong Shao, Valery Trifonov
ACL
2001
13 years 10 months ago
Practical Issues in Compiling Typed Unification Grammars for Speech Recognition
Current alternatives for language modeling are statistical techniques based on large amounts of training data, and hand-crafted context-free or finite-state grammars that are diff...
John Dowding, Beth Ann Hockey, Jean Mark Gawron, C...
ICSE
2008
IEEE-ACM
14 years 9 months ago
Best practices in extreme programming course design
Teaching (and therefore learning) eXtreme Programming (XP) in a university setting is difficult because of course time limitations and the soft nature of XP that requires first-ha...
Kai Stapel, Daniel Lübke, Eric Knauss
SOFSEM
2010
Springer
14 years 5 months ago
Practically Applicable Formal Methods
Abstract. Formal methods are considered to be highly expensive. Therefore, they are currently applied almost only in high risk software development. In this paper, we show that for...
Jedrzej Fulara, Krzysztof Jakubczyk