Sciweavers

151 search results - page 22 / 31
» Strong normalization from an unusual point of view
Sort
View
IMA
2007
Springer
137views Cryptology» more  IMA 2007»
14 years 1 months ago
Algebraic Cryptanalysis of the Data Encryption Standard
In spite of growing importance of AES, the Data Encryption Standard is by no means obsolete. DES has never been broken from the practical point of view. The triple DES is believed ...
Nicolas Courtois, Gregory V. Bard
PEWASUN
2007
ACM
13 years 8 months ago
Worst-case lifetime computation of a wireless sensor network by model-checking
Wireless Sensor Network (WSN) technology is now mature enough to be used in numerous application domains. However, due to the restricted amount of energy usually allocated to each...
Laurent Mounier, Ludovic Samper, Wassim Znaidi
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 7 months ago
Deploying Wireless Networks with Beeps
Abstract. We present the discrete beeping communication model, which assumes nodes have minimal knowledge about their environment and severely limited communication capabilities. S...
Alejandro Cornejo, Fabian Kuhn
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
14 years 1 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
ITICSE
2005
ACM
14 years 29 days ago
Implications of perspective in teaching objects first and object design
There are an increasing number of books published on the important topics of “object-oriented programming” and “object-oriented design” for use in education. However, obje...
Henrik Bærbak Christensen