Sciweavers

400 search results - page 21 / 80
» Derandomization and Distinguishing Complexity
Sort
View
COMPLEX
2009
Springer
15 years 6 months ago
Comparing Networks from a Data Analysis Perspective
To probe network characteristics, two predominant ways of network comparison are global property statistics and subgraph enumeration. However, they suffer from limited information...
Wei Li, Jing-Yu Yang
SLE
2009
Springer
15 years 6 months ago
Composing Feature Models
Feature modeling is a widely used technique in Software Product Line development. Feature models allow stakeholders to describe domain concepts in terms of commonalities and diffe...
Mathieu Acher, Philippe Collet, Philippe Lahire, R...
FSE
2005
Springer
84views Cryptology» more  FSE 2005»
15 years 5 months ago
Some Attacks on the Bit-Search Generator
The bit-search generator (BSG) was proposed in 2004 and can be seen as a variant of the shrinking and self-shrinking generators. It has the advantage that it works at rate 1/3 usin...
Martin Hell, Thomas Johansson
INDOCRYPT
2005
Springer
15 years 5 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov
FASE
2010
Springer
15 years 6 months ago
Prescriptive Semantics for Big-Step Modelling Languages
f abstraction, providing an effective way to discover a Web service based on its interface. Awards and Scholarships - Ontario Graduate Scholarship (OGS), 2008 - Ontario Graduate S...
Shahram Esmaeilsabzali, Nancy A. Day