Sciweavers

1148 search results - page 39 / 230
» Software engineering considered harmful
Sort
View
AC
1998
Springer
14 years 1 months ago
Contemporary Block Ciphers
This paper considers modern secret-key block ciphers. The theory behind the design and analysis of modern block ciphers is explained, and the most important known attacks are outli...
Lars R. Knudsen
CBSE
2004
Springer
14 years 1 months ago
Performance Prediction for Component Compositions
A stepwise approach is proposed to predict the performance of component compositions. The approach considers the major factors influencing the performance of component compositions...
Evgeni M. Eskenazi, Alexandre V. Fioukov, Dieter K...
FOSSACS
2006
Springer
14 years 1 months ago
Parity Games Played on Transition Graphs of One-Counter Processes
We consider parity games played on special pushdown graphs, namely those generated by one-counter processes. For parity games on pushdown graphs, it is known from [22] that decidin...
Olivier Serre
FSTTCS
2006
Springer
14 years 1 months ago
Almost Optimal Strategies in One Clock Priced Timed Games
We consider timed games extended with cost information, and prove computability of the optimal cost and of -optimal memoryless strategies in timed games with one clock. In contrast...
Patricia Bouyer, Kim Guldstrand Larsen, Nicolas Ma...
FSTTCS
2000
Springer
14 years 1 months ago
Model Checking CTL Properties of Pushdown Systems
: A pushdown system is a graph G(P) of configurations of a pushdown automaton P. The model checking problem for a logic L is: given a pushdown automaton P and a formula L decide ...
Igor Walukiewicz