Sciweavers

970 search results - page 87 / 194
» cases 2011
Sort
View
EJC
2011
13 years 1 months ago
A Tutte-style proof of Brylawski's tensor product formula
We provide a new proof of Brylawski’s formula for the Tutte polynomial of the tensor product of two matroids. Our proof involves extending Tutte’s formula, expressing the Tutte...
Yuanan Diao, Gábor Hetyei, Kenneth Hinson
ESSOS
2011
Springer
13 years 1 months ago
An Architecture-Centric Approach to Detecting Security Patterns in Software
Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security....
Michaela Bunke, Karsten Sohr
FASE
2011
Springer
13 years 1 months ago
Testing Container Classes: Random or Systematic?
Abstract. Container classes such as lists, sets, or maps are elementary data structures common to many programming languages. Since they are a part of standard libraries, they are ...
Rohan Sharma, Milos Gligoric, Andrea Arcuri, Gordo...
FSE
2011
Springer
268views Cryptology» more  FSE 2011»
13 years 1 months ago
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
At Eurocrypt 2001, Biryukov and Shamir investigated the security of AES-like ciphers where the substitutions and affine transformations are all key-dependent and successfully crypt...
Julia Borghoff, Lars R. Knudsen, Gregor Leander, S...
HCI
2011
13 years 1 months ago
Proposal of BCM Evaluation Method Based on Disaster Scenario Simulation
Almost 20% of big earthquakes in the world occur in Japan. It becomes impossible for private companies and governments to carry out their business if they suffer from severe damage...
Ryuhei Kaneko, Yoshio Nakatani