Sciweavers

232 search results - page 37 / 47
» Twenty Years Later
Sort
View
VLDB
2005
ACM
119views Database» more  VLDB 2005»
14 years 29 days ago
Database-Inspired Search
“W3QL: A Query Language for the WWW”, published in 1995, presented a language with several distinctive features. Employing existing indexes as access paths, it allowed the sel...
David Konopnicki, Oded Shmueli
FSE
2004
Springer
115views Cryptology» more  FSE 2004»
14 years 26 days ago
Correlation Attacks Using a New Class of Weak Feedback Polynomials
In 1985 Siegenthaler introduced the concept of correlation attacks on LFSR based stream ciphers. A few years later Meier and Staffelbach demonstrated a special technique, usually ...
Håkan Englund, Martin Hell, Thomas Johansson
ISESE
2003
IEEE
14 years 23 days ago
Building Pair Programming Knowledge through a Family of Experiments
Pair programming is a practice in which two programmers work collaboratively at one computer on the same design, algorithm, code, or test. Pair programming is becoming increasingl...
Laurie A. Williams, Charlie McDowell, Nachiappan N...
INDOCRYPT
2003
Springer
14 years 20 days ago
Security Analysis of Several Group Signature Schemes
At Eurocrypt’91, Chaum and van Heyst introduced the concept of group signature. In such a scheme, each group member is allowed to sign messages on behalf of a group anonymously. ...
Guilin Wang
RE
2009
Springer
14 years 1 days ago
Improving the Exchange of Requirements and Specifications between Business Partners
Increasingly complex supplier-relationships dominate product development, independent of industries and products. Mostly the primary source of risks and later problems is insuffic...
Manuel Reis Monteiro, Christof Ebert, Matthias Rec...