Sciweavers

16616 search results - page 98 / 3324
» Extending Extended Vacuity
Sort
View
TCC
2010
Springer
231views Cryptology» more  TCC 2010»
16 years 1 months ago
A Domain Extender for the Ideal Cipher
We describe the first domain extender for ideal ciphers, i.e. we show a construction that is indifferentiable from a 2n-bit ideal cipher, given a n-bit ideal cipher. Our construc...
Jean-Sébastien Coron, Yevgeniy Dodis, Avrad...
165
Voted
CISIS
2010
IEEE
15 years 11 months ago
UbiPAN: A Bluetooth Extended Personal Area Network
—Most mobile devices are now Bluetooth-enabled. This wireless technology makes it possible to transfer files or stream contents between pieces of equipment. The possibly many de...
Jeremie Albert, Tegawende F. Bissyande, Yér...
SAC
2009
ACM
15 years 11 months ago
Extending Problem Frames to deal with stakeholder problems
The Problem Frames approach captures problems as seen by developers, but not by stakeholders. This paper presents a framework that extends the problem diagram of the Problem Frame...
An Agent, Goal-Oriented Approach
VMCAI
2009
Springer
15 years 11 months ago
Extending Symmetry Reduction by Exploiting System Architecture
Abstract. Symmetry reduction is a technique to alleviate state explosion in model checking by replacing a model of replicated processes with a bisimilar quotient model. The size of...
Richard J. Trefler, Thomas Wahl
MOMPES
2009
IEEE
15 years 10 months ago
ArcheOpterix: An extendable tool for architecture optimization of AADL models
For embedded systems quality requirements are equally if not even more important than functional requirements. The foundation for the fulfillment of these quality requirements ha...
Aldeida Aleti, Stefan Björnander, Lars Grunsk...