Sciweavers

1898 search results - page 62 / 380
» Weak Keys for IDEA
Sort
View
FSE
2006
Springer
174views Cryptology» more  FSE 2006»
14 years 12 days ago
Distinguishing Attacks on the Stream Cipher Py
The stream cipher Py designed by Biham and Seberry is a submission to the ECRYPT stream cipher competition. The cipher is based on two large arrays (one is 256 bytes and the other ...
Souradyuti Paul, Bart Preneel, Gautham Sekar
EWSPT
2000
Springer
14 years 10 days ago
A CMM-Based Evaluation of the V-Model 97
The V-Model 97 is a widely used process model in Germany and Europe. It is the development standard for IT-Systems of the Federal Republic of Germany and the basis of Austria'...
Viktor Schuppan, Winfried Rußwurm
DEBU
2000
115views more  DEBU 2000»
13 years 8 months ago
Database Design for Real-World E-Commerce Systems
This paper discusses the structure and components of databases for real-world e-commerce systems. We first present an integrated 8-process value chain needed by the e-commerce sys...
Il-Yeol Song, Kyu-Young Whang
GECCO
2008
Springer
155views Optimization» more  GECCO 2008»
13 years 9 months ago
A no-free-lunch framework for coevolution
The No-Free-Lunch theorem is a fundamental result in the field of black-box function optimization. Recent work has shown that coevolution can exhibit free lunches. The question a...
Travis C. Service, Daniel R. Tauritz
POPL
2001
ACM
14 years 9 months ago
A generic type system for the Pi-calculus
We propose a general, powerful framework of type systems for the -calculus, and show that we can obtain as its instances a variety of type systems guaranteeing non-trivial propert...
Atsushi Igarashi, Naoki Kobayashi