Sciweavers

5122 search results - page 862 / 1025
» Comparing Consequence Relations
Sort
View
ITC
2003
IEEE
157views Hardware» more  ITC 2003»
15 years 9 months ago
Parity-Based Concurrent Error Detection in Symmetric Block Ciphers
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption. We will describe a general concurren...
Ramesh Karri, Grigori Kuznetsov, Michael Göss...
KBSE
2003
IEEE
15 years 9 months ago
What Test Oracle Should I Use for Effective GUI Testing?
Test designers widely believe that the overall effectiveness and cost of software testing depends largely on the type and number of test cases executed on the software. In this pa...
Atif M. Memon, Ishan Banerjee, Adithya Nagarajan
131
Voted
CCS
2003
ACM
15 years 9 months ago
On the performance, feasibility, and use of forward-secure signatures
Forward-secure signatures (FSSs) have recently received much attention from the cryptographic theory community as a potentially realistic way to mitigate many of the difficulties...
Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew...
DGCI
2003
Springer
15 years 9 months ago
Shape Similarity and Visual Parts
Abstract. Human perception of shape is based on visual parts of objects to a point that a single, significant visual part is sufficient to recognize the whole object. For example,...
Longin Jan Latecki, Rolf Lakämper, Diedrich W...
JCDL
2010
ACM
199views Education» more  JCDL 2010»
15 years 9 months ago
Crowdsourcing the assembly of concept hierarchies
The“wisdom of crowds”is accomplishing tasks that are cumbersome for individuals yet cannot be fully automated by means of specialized computer algorithms. One such task is the...
Kai Eckert, Mathias Niepert, Christof Niemann, Cam...