Sciweavers

4636 search results - page 189 / 928
» Modelling and Validation with VipTool
Sort
View
TELSYS
2002
131views more  TELSYS 2002»
13 years 7 months ago
Call Blocking Performance Study for PCS Networks under More Realistic Mobility Assumptions
Abstract. In the micro-cell-based PCS networks, due to the high user mobility, handoffs occur more frequently. Hence, the classical assumptions, such as the exponential assumptions...
Helen Zeng, Yuguang Fang, Imrich Chlamtac
ASIACRYPT
2010
Springer
13 years 6 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
SMA
1993
ACM
124views Solid Modeling» more  SMA 1993»
14 years 3 days ago
Intelligent form feature interaction management in a cellular modeling scheme
Form features present a rather attractive building block in computer-aided design environments for a variety of applications, providing the embodiment of engineering semantics in ...
Rafael Bidarra, José Carlos Teixeira
EDBT
2006
ACM
177views Database» more  EDBT 2006»
14 years 8 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
EMSOFT
2007
Springer
14 years 2 months ago
Virtual execution of AADL models via a translation into synchronous programs
Architecture description languages are used to describe both the hardware and software architecture of an application, at system-level. The basic software components are intended ...
Erwan Jahier, Nicolas Halbwachs, Pascal Raymond, X...