Sciweavers

846 search results - page 22 / 170
» The Use of Z
Sort
View
MYCRYPT
2005
Springer
123views Cryptology» more  MYCRYPT 2005»
14 years 1 months ago
Optimization of the MOVA Undeniable Signature Scheme
This article presents optimization results on the recent MOVA undeniable signature scheme presented by Monnerat and Vaudenay at PKC ’04 as well as its generalization proposed at ...
Jean Monnerat, Yvonne Anne Oswald, Serge Vaudenay
ANCS
2009
ACM
13 years 5 months ago
Experience with high-speed automated application-identification for network-management
AtoZ, an automatic traffic organizer, provides control of how network-resources are used by applications. It does this by combining the high-speed packet processing of the NetFPGA...
Marco Canini, Wei Li 0009, Martin Zádn&iacu...
ZUM
1992
Springer
13 years 11 months ago
Specification in Fresco
software in the form of abstract classes; and the specification elements of the language can also be used in concrete classes to document the implementations and their development ...
Alan Wills
FORTEST
2008
13 years 9 months ago
From MC/DC to RC/DC: Formalization and Analysis of Control-Flow Testing Criteria
This paper describes an approach to the formalization of existing criteria used in computer systems software testing and proposes a new Reinforced Condition/Decision Coverage (RC/D...
Sergiy A. Vilkomir, Jonathan P. Bowen
ICS
1989
Tsinghua U.
13 years 11 months ago
Convergence rate and termination of asynchronous iterative algorithms
We consider iterative algorithms of the form z := f(z), executed by a parallel or distributed computing system. We focus on asynchronous implementations whereby each processor ite...
Dimitri P. Bertsekas, John N. Tsitsiklis