Sciweavers

1248 search results - page 28 / 250
» The I Test
Sort
View
IACR
2011
127views more  IACR 2011»
12 years 7 months ago
Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
In 2008 I. Dinur and A. Shamir presented a new type of algebraic attack on symmetric ciphers named cube attack. The method has been applied to reduced variants of stream ciphers T...
Piotr Mroczkowski, Janusz Szmidt
STOC
2004
ACM
177views Algorithms» more  STOC 2004»
14 years 7 months ago
Lower bounds for linear degeneracy testing
Abstract. In the late nineties, Erickson proved a remarkable lower bound on the decision tree complexity of one of the central problems of computational geometry: given n numbers, ...
Nir Ailon, Bernard Chazelle
RSP
2007
IEEE
139views Control Systems» more  RSP 2007»
14 years 1 months ago
Verifying Distributed Protocols using MSC-Assertions, Run-time Monitoring, and Automatic Test Generation
This paper addresses the need for formal specification and runtime verification of system-level requirements of distributed reactive systems. It describes a formalism for specifyi...
Doron Drusinsky, Man-tak Shing
COCO
2007
Springer
89views Algorithms» more  COCO 2007»
14 years 1 months ago
Testing Properties of Constraint-Graphs
We study a model of graph related formulae that we call the Constraint-Graph model. A constraintgraph is a labeled multi-graph (a graph where loops and parallel edges are allowed)...
Shirley Halevy, Oded Lachish, Ilan Newman, Dekel T...
UM
2007
Springer
14 years 1 months ago
Evaluating a Simulated Student Using Real Students Data for Training and Testing
: SimStudent is a machine-learning agent that learns cognitive skills by demonstration. It was originally developed as a building block of the Cognitive Tutor Authoring Tools (CTAT...
Noboru Matsuda, William W. Cohen, Jonathan Sewall,...