Sciweavers

3057 search results - page 439 / 612
» Complexity management
Sort
View
ISW
2009
Springer
15 years 10 months ago
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
The recently started SHA-3 competition in order to find a new secure hash standard and thus a replacement for SHA-1/SHA-2 has attracted a lot of interest in the academic world as ...
Mario Lamberger, Florian Mendel
106
Voted
MKM
2009
Springer
15 years 10 months ago
A Logically Saturated Extension of
This paper presents a proof language based on the work of Sacerdoti Coen [1,2], Kirchner [3] and Autexier [4] on ¯λµ˜µ, a calculus introduced by Curien and Herbelin [5,6]. Jus...
Lionel Elie Mamane, Herman Geuvers, James McKinna
FDG
2009
ACM
15 years 10 months ago
Emphasizing soft skills and team development in an educational digital game design course
Engineering education has evolved from providing students solely with technical skills to providing them with courses that provide students with the non-technical “soft skills...
Quincy Brown, Frank J. Lee, Suzanne Alejandre
MOBILWARE
2009
ACM
15 years 10 months ago
Middleware Solutions for Self-organizing Multi-hop Multi-path Internet Connectivity Based on Bluetooth
The availability of heterogeneous wireless interfaces and of growing computing resources on widespread portable devices pushes for enabling innovative deployment scenarios where mo...
Paolo Bellavista, Carlo Giannelli
106
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Diverter: a new approach to networking within virtualized infrastructures
As virtualized data-centres become the back-end platforms behind a new generation of utility and cloud computing infrastructures (such as AmazonAWS [1]) their multi-tenancy, scale...
Aled Edwards, Anna Fischer, Antonio Lain