Sciweavers

519 search results - page 83 / 104
» Using Goal-Models to Analyze Variability
Sort
View
CTRSA
2006
Springer
183views Cryptology» more  CTRSA 2006»
14 years 11 days ago
Efficient Doubling on Genus 3 Curves over Binary Fields
The most important and expensive operation in a hyperelliptic curve cryptosystem (HECC) is scalar multiplication by an integer k, i.e., computing an integer k times a divisor D on ...
Xinxin Fan, Thomas J. Wollinger, Yumin Wang
WSC
2008
13 years 11 months ago
Simulating order fulfillment and supply planning for a vertically aligned industry solution business
We model supply chain of an industry solution equipment manufacturer, where the merchandise is sold worldwide, but suppliers are mostly located in Asia. The preferred shipment of ...
Feng Cheng, Young M. Lee, Hongwei Ding, Wei Wang, ...
ISSRE
2007
IEEE
13 years 10 months ago
Generating Trace-Sets for Model-based Testing
Model-checkers are powerful tools that can find individual traces through models to satisfy desired properties. These traces provide solutions to a number of problems. Instead of...
Birgitta Lindström, Paul Pettersson, Jeff Off...
ICONIP
2008
13 years 10 months ago
Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly
In this paper, we try to develop a machine learning-based virus email detection method. The key feature of this paper is employing Mail Header and Encoding Anomaly(MHEA) [1]. MHEA ...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
DAGSTUHL
2006
13 years 10 months ago
Nonlinear Transaction Pricing in the Securities Trading Value Chain
Most of the research on transaction costs in the market microstructure literature focuses on implicit transaction costs. Research on the design of price schedules for explicit tra...
Matthias Burghardt