Sciweavers

1210 search results - page 136 / 242
» Specifying Precise Use Cases with Use Case Charts
Sort
View
130
Voted
RV
2010
Springer
122views Hardware» more  RV 2010»
15 years 2 months ago
Clara: A Framework for Partially Evaluating Finite-State Runtime Monitors Ahead of Time
Researchers have developed a number of runtime verification tools that generate runtime monitors in the form of AspectJ aspects. In this work, we present Clara, a novel framework ...
Eric Bodden, Patrick Lam, Laurie J. Hendren
IACR
2011
120views more  IACR 2011»
14 years 3 months ago
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular elliptic curves. The main t...
David Jao, Luca De Feo
IACR
2011
177views more  IACR 2011»
14 years 3 months ago
New attacks on Keccak-224 and Keccak-256
The Keccak hash function is one of the five finalists in NIST’s SHA-3 competition, and so far it showed remarkable resistance against practical collision finding attacks: Afte...
Itai Dinur, Orr Dunkelman, Adi Shamir
149
Voted
FORTE
1996
15 years 5 months ago
Combined Application of SDL-92, OMT, MSC and TTCN
The paper describes the application of SDL-92[1] and OMT[2] to the design of a V5.x Access Network interface. While OMT is used to model the management aspects of the system, typi...
Eurico Inocêncio, Manuel Ricardo, Hitoshi Sa...
ETS
2006
IEEE
119views Hardware» more  ETS 2006»
15 years 4 months ago
An Ontology-Based Framework for Bridging Learning Design and Learning Content
The paper describes an ontology-based framework for bridging learning design and learning object content. In present solutions, researchers have proposed conceptual models and dev...
Colin Knight, Dragan Gasevic, Griff Richards