Sciweavers

1606 search results - page 277 / 322
» Methodological Approach for Developing a KMS: A Case Study
Sort
View
CRYPTO
2004
Springer
86views Cryptology» more  CRYPTO 2004»
15 years 9 months ago
On Multiple Linear Approximations
In this paper we study the long standing problem of information extraction from multiple linear approximations. We develop a formal statistical framework for block cipher attacks b...
Alex Biryukov, Christophe De Cannière, Mich...
MIDDLEWARE
2004
Springer
15 years 9 months ago
Research directions in reflective middleware: the Lancaster experience
In this paper, we survey three generation of reflective middleware research carried out at Lancaster University, present experiences gained from this research, and highlight a num...
Gordon S. Blair, Geoff Coulson, Paul Grace
FM
2003
Springer
115views Formal Methods» more  FM 2003»
15 years 9 months ago
Model Checking FTA
Safety is increasingly important for software based, critical systems. Fault tree analysis (FTA) is a safety technique from engineering, developed for analyzing and assessing syste...
Andreas Thums, Gerhard Schellhorn
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
15 years 9 months ago
Knowledge-Based IS Implementation Support: An Application to the IS Change Agent Role Problem
The threat of abandoned or extensively overhauled IS is a major concern for both MIS specialists and businesses. This concern may stem from the mismatch between MIS specialist cha...
Meral Binbasioglu, Elaine Winston
ICSE
1998
IEEE-ACM
15 years 8 months ago
Design Components: Towards Software Composition at the Design Level
Component-based software development has proven effective for systems implementation in well-understood application domains, but is still insufficient for the creation of reusable...
Rudolf K. Keller, Reinhard Schauer