Sciweavers

892 search results - page 162 / 179
» Strategies in sentential reasoning
Sort
View
IPPS
2009
IEEE
14 years 2 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
ATAL
2009
Springer
14 years 1 months ago
An agent-based approach to component management
This paper details the implementation of a software framework that aids the development of distributed and self-configurable software systems. This framework is an instance of a n...
David Lillis, Rem W. Collier, Mauro Dragone, Grego...
LICS
2008
IEEE
14 years 1 months ago
Collapsible Pushdown Automata and Recursion Schemes
Collapsible pushdown automata (CPDA) are a new kind of higher-order pushdown automata in which every symbol in the stack has a link to a stack situated somewhere below it. In addi...
Matthew Hague, Andrzej S. Murawski, C.-H. Luke Ong...
CAISE
2007
Springer
14 years 1 months ago
Analyzing the Business of Software: A Modelling Technique for Software Supply Networks
Abstract. One of the most significant paradigm shifts of software business management is that individual organizations no longer compete as single entities but as complex dynamic ...
Slinger Jansen, Anthony Finkelstein, Sjaak Brinkke...
IMA
2007
Springer
97views Cryptology» more  IMA 2007»
14 years 1 months ago
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes
Non-linear cryptanalysis is a natural extension to Matsui’s linear cryptanalitic techniques in which linear approximations are replaced by nonlinear expressions. Non-linear appro...
Juan M. Estévez-Tapiador, John A. Clark, Ju...