Sciweavers

322 search results - page 51 / 65
» Satisfiability Coding Lemma
Sort
View
ISCAS
2003
IEEE
114views Hardware» more  ISCAS 2003»
14 years 1 months ago
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions
Couple to the communications wired and unwired networks growth, is the increasing demand for strong secure data transmission. New cryptographic standards are developed, and new en...
Nicolas Sklavos, Odysseas G. Koufopavlou
STEP
2003
IEEE
14 years 1 months ago
Incorporating Quality Requirements in Software Migration Process
The reengineering of legacy software systems to modern Object Oriented platforms has received significant attention over the past few years. However, most often the reengineering ...
Ying Zou
FATES
2003
Springer
14 years 1 months ago
Auto-generating Test Sequences Using Model Checkers: A Case Study
Use of model-checking approaches for test generation from requirement models have been proposed by several researchers. These approaches leverage the witness (or counter-example) ...
Mats Per Erik Heimdahl, Sanjai Rayadurgam, Willem ...
PAAMS
2009
Springer
14 years 1 months ago
A Tool for Generating Model Transformations By-Example in Multi-Agent Systems
Abstract Many Multi-Agent Systems (MAS) methodologies incorporate a modeldriven approach. Model Driven Engineering is based on three main ideas: models are the “first-class citi...
Iván García-Magariño, Sylvain...
SIGSOFT
1998
ACM
14 years 25 days ago
Further Empirical Studies of Test Effectiveness
This paper reports on an empirical evaluation of the fault-detecting ability of two white-box software testing techniques: decision coverage (branch testing) and the all-uses data...
Phyllis G. Frankl, Oleg Iakounenko