Sciweavers

1937 search results - page 296 / 388
» Starting B Specifications from Use Cases
Sort
View
PKC
2005
Springer
89views Cryptology» more  PKC 2005»
15 years 10 months ago
A New Related Message Attack on RSA
Coppersmith, Franklin, Patarin, and Reiter show that given two RSA cryptograms xe mod N and (ax + b)e mod N for known constants a, b ∈ ZN , one can compute x in O(e log2 e) ZN -o...
Oded Yacobi, Yacov Yacobi
ISSRE
2003
IEEE
15 years 10 months ago
Augmenting Simulated Annealing to Build Interaction Test Suites
Component based software development is prone to unexpected interaction faults. The goal is to test as many potential interactions as is feasible within time and budget constraint...
Myra B. Cohen, Charles J. Colbourn, Alan C. H. Lin...
EVOW
2003
Springer
15 years 10 months ago
Landscape State Machines: Tools for Evolutionary Algorithm Performance Analyses and Landscape/Algorithm Mapping
Abstract. Many evolutionary algorithm applications involve either fitness functions with high time complexity or large dimensionality (hence very many fitness evaluations will typi...
David Corne, Martin J. Oates, Douglas B. Kell
GLVLSI
2010
IEEE
209views VLSI» more  GLVLSI 2010»
15 years 9 months ago
Enhancing debugging of multiple missing control errors in reversible logic
Researchers are looking for alternatives to overcome the upcoming limits of conventional hardware technologies. Reversible logic thereby established itself as a promising directio...
Jean Christoph Jung, Stefan Frehse, Robert Wille, ...
ICDCSW
2002
IEEE
15 years 9 months ago
The Impact of Data Aggregation in Wireless Sensor Networks
Sensor networks are distributed event-based systems that differ from traditional communication networks in several ways: sensor networks have severe energy constraints, redundant ...
Bhaskar Krishnamachari, Deborah Estrin, Stephen B....