Sciweavers

1937 search results - page 115 / 388
» Starting B Specifications from Use Cases
Sort
View
CCS
2008
ACM
15 years 6 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
134
Voted
EGC
2009
Springer
15 years 2 months ago
Discrepancy Analysis of Complex Objects Using Dissimilarities
Abstract. In this article we consider objects for which we have a matrix of dissimilarities and we are interested in their links with covariates. We focus on state sequences for wh...
Matthias Studer, Gilbert Ritschard, Alexis Gabadin...
ICCAD
2009
IEEE
118views Hardware» more  ICCAD 2009»
15 years 2 months ago
Memory organization and data layout for instruction set extensions with architecturally visible storage
Present application specific embedded systems tend to choose instruction set extensions (ISEs) based on limitations imposed by the available data bandwidth to custom functional un...
Panagiotis Athanasopoulos, Philip Brisk, Yusuf Leb...
BMCBI
2005
124views more  BMCBI 2005»
15 years 4 months ago
Probabilistic annotation of protein sequences based on functional classifications
: One of the most evident achievements of bioinformatics is the development of methods that transfer biological knowledge from characterised proteins to uncharacterised sequences. ...
Emmanuel D. Levy, Christos A. Ouzounis, Walter R. ...
FSE
1994
Springer
134views Cryptology» more  FSE 1994»
15 years 8 months ago
Cryptanalysis of McGuffin
This paper shows that the actual proposal for an unbalanced Feistel network by Schneier and Blaze is as vulnerable to differential cryptanalysis as the DES. 1 McGuffin Schneier and...
Vincent Rijmen, Bart Preneel