Sciweavers

GI
2008
Springer
15 years 2 months ago
Methoden formalisierter Kundenanforderungsanalyse
: Der Übergang von der Kundensystemspezifikation (als Bestandteil des Lastenhefts) zur Systemspezifikation (als Bestandteil des Pflichtenhefts) beinhaltet das Auffinden und Beseit...
Roland Kapeller
CSR
2008
Springer
15 years 2 months ago
Cryptanalysis of Stickel's Key Exchange Scheme
We offer cryptanalysis of a key exchange scheme due to Stickel [11], which was inspired by the well-known Diffie-Hellman protocol. We show that Stickel's choice of platform (t...
Vladimir Shpilrain
TCS
2008
15 years 1 months ago
Algorithms for subsequence combinatorics
A subsequence is obtained from a string by deleting any number of characters; thus in contrast to a substring, a subsequence is not necessarily a contiguous part of the string. Co...
Cees H. Elzinga, Sven Rahmann, Hui Wang
FOCS
2008
IEEE
15 years 7 months ago
Degree Bounded Network Design with Metric Costs
Given a complete undirected graph, a cost function on edges and a degree bound B, the degree bounded network design problem is to find a minimum cost simple subgraph with maximum...
Yuk Hei Chan, Wai Shing Fung, Lap Chi Lau, Chun Ko...
Theoretical Computer Science
Top of PageReset Settings