Sciweavers

1606 search results - page 277 / 322
» Methodological Approach for Developing a KMS: A Case Study
Sort
View
CRYPTO
2004
Springer
86views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
On Multiple Linear Approximations
In this paper we study the long standing problem of information extraction from multiple linear approximations. We develop a formal statistical framework for block cipher attacks b...
Alex Biryukov, Christophe De Cannière, Mich...
MIDDLEWARE
2004
Springer
14 years 29 days ago
Research directions in reflective middleware: the Lancaster experience
In this paper, we survey three generation of reflective middleware research carried out at Lancaster University, present experiences gained from this research, and highlight a num...
Gordon S. Blair, Geoff Coulson, Paul Grace
FM
2003
Springer
115views Formal Methods» more  FM 2003»
14 years 25 days ago
Model Checking FTA
Safety is increasingly important for software based, critical systems. Fault tree analysis (FTA) is a safety technique from engineering, developed for analyzing and assessing syste...
Andreas Thums, Gerhard Schellhorn
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
14 years 17 days ago
Knowledge-Based IS Implementation Support: An Application to the IS Change Agent Role Problem
The threat of abandoned or extensively overhauled IS is a major concern for both MIS specialists and businesses. This concern may stem from the mismatch between MIS specialist cha...
Meral Binbasioglu, Elaine Winston
ICSE
1998
IEEE-ACM
13 years 11 months ago
Design Components: Towards Software Composition at the Design Level
Component-based software development has proven effective for systems implementation in well-understood application domains, but is still insufficient for the creation of reusable...
Rudolf K. Keller, Reinhard Schauer