Sciweavers

8132 search results - page 1611 / 1627
» Dependability, Abstraction, and Programming
Sort
View
CAV
2008
Springer
139views Hardware» more  CAV 2008»
14 years 11 months ago
CSIsat: Interpolation for LA+EUF
We present CSIsat, an interpolating decision procedure for the quantifier-free theory of rational linear arithmetic and equality with uninterpreted function symbols. Our implementa...
Dirk Beyer, Damien Zufferey, Rupak Majumdar
CTRSA
2008
Springer
150views Cryptology» more  CTRSA 2008»
14 years 11 months ago
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Abstract. Camellia and MISTY1 are Feistel block ciphers. In this paper, we observe that, when conducting impossible differential cryptanalysis on Camellia and MISTY1, their round s...
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunke...
DIAGRAMS
2008
Springer
14 years 11 months ago
Diagrams in the UK National School Curriculum
Abstract. We review the use of diagrams in the UK National School Curriculum (NC) and assess it in the light of current research on childrens' graph comprehension. It is noted...
Grecia Garcia Garcia, Richard Cox
ESORICS
2008
Springer
14 years 11 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi
CIC
2006
14 years 11 months ago
IIOP Failover in Dynamic Clusters
Abstract-Requirement: Clients should experience high-availability when accessing network services. Availability should be transparent and not require altering programs. Problem: Av...
Harold Carr, Ken Cavanaugh
« Prev « First page 1611 / 1627 Last » Next »