Sciweavers

206 search results - page 24 / 42
» Weak Alternating Automata Are Not That Weak
Sort
View
EUROCRYPT
2001
Springer
14 years 3 days ago
Structural Cryptanalysis of SASAS
In this paper we consider the security of block ciphers which contain alternate layers of invertible S-boxes and affine mappings (there are many popular cryptosystems which use thi...
Alex Biryukov, Adi Shamir
ICECCS
2000
IEEE
106views Hardware» more  ICECCS 2000»
13 years 11 months ago
Evaluation of Three Specification-Based Testing Criteria
This paper compares three specification-based testing criteria using Mathur and Wong's PROBSUBSUMES measure. The three criteria are specification-mutation coverage, full pred...
Aynur Abdurazik, Paul Ammann, Wei Ding 0003, A. Je...
DALT
2008
Springer
13 years 9 months ago
Iterated Belief Revision in the Face of Uncertain Communication
Abstract. This paper offers a formalization of iterated belief revision for multiagent communication using the logic of communication graphs introduced in [15]. In this study we co...
Yoshitaka Suzuki, Satoshi Tojo, Stijn De Saeger
IADIS
2003
13 years 9 months ago
Requirements for Groupware Calendar Systems (GCS): Addressing Social Relationships
This paper challenges the generic single conceptual viewpoint that designers have of groupware and specifically Groupware Calendar Systems (GCS). From the analysis of interviews, ...
Sungmin Park, Howard Harris, Patricia Crosbie
CSL
2008
Springer
13 years 7 months ago
User simulation in a stochastic dialog system
We present a new methodology of user simulation applied to the evaluation and refinement of stochastic dialog systems. Common weaknesses of these systems are the scarceness of the...
Francisco Torres, Emilio Sanchis, Encarna Segarra