Sciweavers

91
Voted
GI
2008
Springer
15 years 1 months ago
Methoden formalisierter Kundenanforderungsanalyse
: Der Übergang von der Kundensystemspezifikation (als Bestandteil des Lastenhefts) zur Systemspezifikation (als Bestandteil des Pflichtenhefts) beinhaltet das Auffinden und Beseit...
Roland Kapeller
141
Voted
CSR
2008
Springer
15 years 2 months ago
Cryptanalysis of Stickel's Key Exchange Scheme
We offer cryptanalysis of a key exchange scheme due to Stickel [11], which was inspired by the well-known Diffie-Hellman protocol. We show that Stickel's choice of platform (t...
Vladimir Shpilrain
157
Voted
TCS
2008
15 years 11 days ago
Algorithms for subsequence combinatorics
A subsequence is obtained from a string by deleting any number of characters; thus in contrast to a substring, a subsequence is not necessarily a contiguous part of the string. Co...
Cees H. Elzinga, Sven Rahmann, Hui Wang
126
Voted
FOCS
2008
IEEE
15 years 7 months ago
Degree Bounded Network Design with Metric Costs
Given a complete undirected graph, a cost function on edges and a degree bound B, the degree bounded network design problem is to find a minimum cost simple subgraph with maximum...
Yuk Hei Chan, Wai Shing Fung, Lap Chi Lau, Chun Ko...
120
Voted
ICYCS
2008
IEEE
15 years 7 months ago
Introduction to the Reform on the Course of Fundamental Logic and Computer Design
Qingsong Shi, Wei Hu, Sha Liu, Tianzhou Chen
Theoretical Computer Science
Top of PageReset Settings