Sciweavers

15474 search results - page 3093 / 3095
» Emergent process design
Sort
View
ACNS
2009
Springer
193views Cryptology» more  ACNS 2009»
15 years 4 months ago
Cryptanalysis of Twister
In this paper, we present a pseudo-collision attack on the compression function of all Twister variants (224,256,384,512) with complexity of about 226.5 compression function evalua...
Florian Mendel, Christian Rechberger, Martin Schl&...
CIKM
2007
Springer
15 years 4 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
ICSE
2007
IEEE-ACM
15 years 3 months ago
ACL2s: "The ACL2 Sedan"
ACL2 is the latest inception of the Boyer-Moore theorem prover, the 2005 recipient of the ACM Software System Award. In the hands of an expert, it feels like a finely tuned race ...
Peter C. Dillinger, Panagiotis Manolios, Daron Vro...
VAMOS
2007
Springer
15 years 3 months ago
A Plea for Help with Variability, in Two Acts
A short theatrical exaggeration (but not too much) which describes practical problems with variability as experienced by real-world software developers. Real issue, there are no p...
Reed Little, Randy Blohm
ASIAN
2005
Springer
178views Algorithms» more  ASIAN 2005»
15 years 3 months ago
An Approach for Service Discovery Based on Semantic Peer-to-Peer
The service discovery is a key step during Peer-to-Peer (P2P) converging with Web Service. In this paper, a semantic-P2P based approach is presented for web service discovery. To e...
Hao Wu, Hai Jin, Yunfa Li, Hanhan Chen
« Prev « First page 3093 / 3095 Last » Next »