Sciweavers

1100 search results - page 70 / 220
» From Goals to Aspects: Discovering Aspects from Requirements...
Sort
View
IACR
2011
73views more  IACR 2011»
14 years 1 months ago
Secure Authentication from a Weak Key, Without Leaking Information
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
Niek J. Bouman, Serge Fehr
OTM
2005
Springer
15 years 7 months ago
Semantic Transformation of Web Services
Abstract. Web services have become the predominant paradigm for the development of distributed software systems. Web services provide the means to modularize software in a way that...
David Bell, Sergio de Cesare, Mark Lycett
201
Voted
VLDB
1998
ACM
170views Database» more  VLDB 1998»
15 years 1 months ago
Advanced Data Processing in KRISYS: Modeling Concepts, Implementation Techniques, and Client/Server Issues
The increasing power of modern computers steadily opens up new application domains for advanced data processing such as engineering and knowledge-based applications. To meet their...
Stefan Deßloch, Theo Härder, Nelson Men...
ENTER
2009
Springer
15 years 8 months ago
Travel Queries on Cities in the United States: Implications for Search Engine Marketing in Tourism
Given the growing importance of online search in travel planning, marketers need to better understand the behavioural aspect of travel planning using search engines. The goal of t...
Zheng Xiang, Bing Pan
VISSOFT
2005
IEEE
15 years 7 months ago
Multi-level Method Understanding Using Microprints
Understanding classes and methods is a key activity in object-oriented programming, since classes represent the abstractions from which applications are built, while methods conta...
Stéphane Ducasse, Michele Lanza, Romain Rob...