Sciweavers

2196 search results - page 9 / 440
» Practical Reasoning Using Values
Sort
View
ASIACRYPT
2009
Springer
14 years 2 months ago
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
The design of cryptographic hash functions is a very complex and failure-prone process. For this reason, this paper puts forward a completely modular and fault-tolerant approach to...
Anja Lehmann, Stefano Tessaro
CADE
2005
Springer
14 years 7 months ago
Deciding Monodic Fragments by Temporal Resolution
In this paper we study the decidability of various fragments of monodic first-order temporal logic by temporal resolution. We focus on two resolution calculi, namely, monodic tempo...
Ullrich Hustadt, Boris Konev, Renate A. Schmidt
PDPTA
2000
13 years 8 months ago
A Parallel Boundary Value Technique for Singularly Perturbed Two-Point Boundary Value Problems
A class of singularly perturbed two-point boundary-value problems (BVPs) for second-order ordinary differential equations (DEs) is considered here. In order to obtain numerical sol...
Srinivasan Natesan, Jesús Vigo-Aguiar
ESEM
2008
ACM
13 years 9 months ago
Using students as subjects - an empirical evaluation
An important task in Requirements Engineering is to select which requirements that should go into a specific release of a system. This is a complex decision that requires balancin...
Mikael Svahnberg, Aybüke Aurum, Claes Wohlin
VTC
2008
IEEE
107views Communications» more  VTC 2008»
14 years 1 months ago
On the Performance of Selection Relaying
—Interest in selection relaying is growing. The recent developments in this area have largely focused on information theoretic analyses such as outage performance. Some of these ...
Abdulkareem Adinoyi, Yijia Fan, Halim Yanikomerogl...