Sciweavers

3667 search results - page 559 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
14 years 2 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
EICS
2009
ACM
14 years 2 months ago
An infrastructure for experience centered agile prototyping of ambient intelligence
Ubiquitous computing poses new usability challenges that cut across design and development. We are particularly interested in "spaces" enhanced with sensors, public disp...
José Luís Silva, José Creissa...
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
14 years 2 months ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
FMCAD
2009
Springer
14 years 2 months ago
Generalized, efficient array decision procedures
Abstract--The theory of arrays is ubiquitous in the context of software and hardware verification and symbolic analysis. The basic array theory was introduced by McCarthy and allow...
Leonardo Mendonça de Moura, Nikolaj Bj&osla...
CLEF
2006
Springer
14 years 1 months ago
University of Twente at GeoCLEF 2006: Geofiltered Document Retrieval
In this report we describe the approach of the University of Twente to the 2006 GeoCLEF task. It is based on retrieval by content and the subsequent filtering by geographical rele...
Claudia Hauff, Dolf Trieschnigg, Henning Rode