Sciweavers

1460 search results - page 114 / 292
» Very Lightweight Requirements Modeling
Sort
View
CTRSA
2008
Springer
160views Cryptology» more  CTRSA 2008»
13 years 12 months ago
Fault Analysis Study of IDEA
We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher's specific property to employ ...
Christophe Clavier, Benedikt Gierlichs, Ingrid Ver...
ICIP
2007
IEEE
14 years 12 months ago
Rotation Detection using the Curl Equation
Rotational types of motion can often be seen in video sequences. However, not a lot of research has been done to investigate rotational motion models for use in video. Analysing t...
Daire Lennon, Naomi Harte, Anil C. Kokaram
ICDE
2007
IEEE
131views Database» more  ICDE 2007»
14 years 4 months ago
Enhancing Secured Service Interoperability with Decentralized Orchestration
Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled...
Ustun Yildiz, Claude Godart
CP
2005
Springer
14 years 3 months ago
Robust Constraint Solving Using Multiple Heuristics
Abstract. Constraint Programming is a proven successful technique, but it requires skill in modeling problems, and knowledge on how algorithms interact with models. What can be a g...
Alfio Vidotto, Kenneth N. Brown, J. Christopher Be...
LCN
2003
IEEE
14 years 3 months ago
Characterization of the Burst Stabilization Protocol for the RR/RR CICQ Switch
Input buffered switches with Virtual Output Queueing (VOQ) can be unstable when presented with unbalanced loads. Existing scheduling algorithms, including iSLIP for Input Queued (...
Neil J. Gunther, Kenneth J. Christensen, Kenji Yos...