Sciweavers

286 search results - page 23 / 58
» Weak Ordering - A New Definition
Sort
View
CTRSA
2009
Springer
155views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Cryptanalysis of CTC2
CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While the structure of CTC is deliberately weak with respect to algebraic attacks, it was claimed...
Orr Dunkelman, Nathan Keller
GPCE
2008
Springer
13 years 9 months ago
On the modularity of feature interactions
Feature modules are the building blocks of programs in software product lines (SPLs). A foundational assumption of feature-based program synthesis is that features are composed in...
Chang Hwan Peter Kim, Christian Kästner, Don ...
SIAMDM
2008
95views more  SIAMDM 2008»
13 years 7 months ago
A Census of Small Latin Hypercubes
We count all latin cubes of order n 6 and latin hypercubes of order n 5 and dimension d 5. We classify these (hyper)cubes into isotopy classes and paratopy classes (main classe...
Brendan D. McKay, Ian M. Wanless
BMCBI
2007
187views more  BMCBI 2007»
13 years 8 months ago
BioWMS: a web-based Workflow Management System for bioinformatics
Background: An in-silico experiment can be naturally specified as a workflow of activities implementing, in a standardized environment, the process of data and control analysis. A...
Ezio Bartocci, Flavio Corradini, Emanuela Merelli,...
EUROCRYPT
1990
Springer
13 years 12 months ago
Propagation Characteristics of Boolean Functions
The relation between the Walsh-Hadamard transform and the autocorrelation function of Boolean functions is used to study propagation characteristics of these functions. The Strict...
Bart Preneel, Werner Van Leekwijck, Luc Van Linden...