Sciweavers

3013 search results - page 506 / 603
» Context-Oriented Domain Analysis
Sort
View
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
15 years 5 months ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi
107
Voted
GECCO
2009
Springer
134views Optimization» more  GECCO 2009»
15 years 5 months ago
Estimating the distribution and propagation of genetic programming building blocks through tree compression
Shin et al [19] and McKay et al [15] previously applied tree compression and semantics-based simplification to study the distribution of building blocks in evolving Genetic Progr...
Robert I. McKay, Xuan Hoai Nguyen, James R. Cheney...
146
Voted
NORDSEC
2009
Springer
15 years 5 months ago
Security Usability of Petname Systems
Abstract. To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to man...
Md. Sadek Ferdous, Audun Jøsang, Kuldeep Si...
DAWAK
2001
Springer
15 years 5 months ago
Adaptable Similarity Search Using Vector Quantization
Adaptable similarity queries based on quadratic form distance functions are widely popular in data mining applications, particularly for domains such as multimedia, CAD, molecular ...
Christian Böhm, Hans-Peter Kriegel, Thomas Se...
ER
2001
Springer
163views Database» more  ER 2001»
15 years 5 months ago
Towards Ontologically Based Semantics for UML Constructs
Abstract. Conceptual models are formal descriptions of application domains that are used in early stages of system development to support requirements analysis. The Unified Modeli...
Joerg Evermann, Yair Wand