Sciweavers

2748 search results - page 339 / 550
» Generating Object-Z Specifications from Use Cases
Sort
View
FSE
2001
Springer
190views Cryptology» more  FSE 2001»
15 years 9 months ago
ZIP Attacks with Reduced Known Plaintext
Abstract. Biham and Kocher demonstrated that the PKZIP stream cipher was weak and presented an attack requiring thirteen bytes of plaintext. The deflate algorithm “zippers” no...
Michael Stay
ASAP
2008
IEEE
105views Hardware» more  ASAP 2008»
15 years 6 months ago
Fast custom instruction identification by convex subgraph enumeration
Automatic generation of custom instruction processors from high-level application descriptions enables fast design space exploration, while offering very favorable performance and...
Kubilay Atasu, Oskar Mencer, Wayne Luk, Can C. &Ou...
IASSE
2004
15 years 5 months ago
A Rationale-based Analysis Tool
The Rationale-based Analysis Tool (RAT) supports analysts, developers, clients and end users during the objectoriented requirements analysis activity. The tool enables different s...
Timo Wolf, Allen H. Dutoit
FORTE
1989
15 years 5 months ago
Compilation of LOTOS Abstract Data Types
ion of LOTOS Abstract Data Types Hubert GARAVEL∗ Laboratoire de G´enie Informatique Institut I.M.A.G. GRENOBLE FRANCE This article describes an experiment with the compilation o...
Hubert Garavel
CORR
2006
Springer
131views Education» more  CORR 2006»
15 years 4 months ago
A framework of reusable structures for mobile agent development
-- Mobile agents research is clearly aiming towards imposing agent based development as the next generation of tools for writing software. This paper comes with its own contributio...
Tudor Marian, Bogdan Dumitriu, Mihaela Dinsoreanu,...