Sciweavers

890 search results - page 173 / 178
» software 1998
Sort
View
SIGUCCS
1998
ACM
13 years 11 months ago
IT Training for Students, Who Needs It?
This presentation will be a discussion of two Information Technology training programs at the university/college level. The two programs are ”The Student Peer Trainers”(SPT) a...
Penny Haselwander
ECOOPW
1998
Springer
13 years 11 months ago
Evaluating OO-CASE Tools: OO Research Meets Practice
Current object-oriented CASE tools are useful for recording and gaining insight into OO models. They offer extensive support for especially the analysis and design of object-orien...
Danny Greefhorst, Mark van Elswijk, Mattijs Maat, ...
FSE
1998
Springer
137views Cryptology» more  FSE 1998»
13 years 11 months ago
Differential Cryptanalysis of the ICE Encryption Algorithm
ICE is a 64-bit block cipher presented at the Fast Software Encryption Workshop in January 1997. It introduced the concept of a keyed permutation to improve the resistance against ...
Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen
PARA
1998
Springer
13 years 11 months ago
Technologies for Teracomputing: A European Option
Abstract. Ahardware and software environment with performance above 1 Tera ops (teracomputing) is presently required to face the leading computational challenges not only in fundam...
Agostino Mathis
RANDOM
1998
Springer
13 years 11 months ago
Using Approximation Hardness to Achieve Dependable Computation
Abstract. Redundancy has been utilized to achieve fault tolerant computation and to achieve reliable communication in networks of processors. These techniques can only be extended ...
Mike Burmester, Yvo Desmedt, Yongge Wang