Sciweavers

4340 search results - page 164 / 868
» Formal Methods and Cryptography
Sort
View
ICISC
2007
100views Cryptology» more  ICISC 2007»
15 years 5 months ago
Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm
Pairing based cryptography is a new public key cryptographic scheme. An elliptic curve suitable for pairing based cryptography is called a “pairing-friendly” elliptic curve. Af...
Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi
151
Voted
FCA
2005
Springer
188views Formal Methods» more  FCA 2005»
15 years 9 months ago
Formal Concept Analysis-Based Class Hierarchy Design in Object-Oriented Software Development
The class hierarchy is an important aspect of object-oriented software development. Design and maintenance of such a hierarchy is a difficult task that is often accomplished witho...
Robert Godin, Petko Valtchev
SIGIR
2004
ACM
15 years 9 months ago
A formal study of information retrieval heuristics
Empirical studies of information retrieval methods show that good retrieval performance is closely related to the use of various retrieval heuristics, such as TF-IDF weighting. On...
Hui Fang, Tao Tao, ChengXiang Zhai
ZUM
2005
Springer
140views Formal Methods» more  ZUM 2005»
15 years 9 months ago
An Object-Oriented Structuring for Z Based on Views
There is significant interest in the use of Z in conjunction with object-orientation. Here we present a new approach to structuring Z specifications in an object-oriented (OO) st...
Nuno Amálio, Fiona Polack, Susan Stepney
FMCAD
2000
Springer
15 years 7 months ago
Do You Trust Your Model Checker?
Abstract. In this paper we describe the formal specification and verification of the efficient algorithm for real-time model checking implemented in the model checker RAVEN. It was...
Wolfgang Reif, Jürgen Ruf, Gerhard Schellhorn...