Sciweavers

7379 search results - page 79 / 1476
» How Many Clusters
Sort
View
108
Voted
CRYPTO
2009
Springer
119views Cryptology» more  CRYPTO 2009»
15 years 7 months ago
How Risky Is the Random-Oracle Model?
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require a hash function with output size larger than standard sizes. We show that the random-oracle instanti...
Gaëtan Leurent, Phong Q. Nguyen
ECWEB
2009
Springer
130views ECommerce» more  ECWEB 2009»
15 years 7 months ago
Perspectives for Web Service Intermediaries: How Influence on Quality Makes the Difference
Abstract. In the service-oriented computing paradigm and the Web service architecture, the broker role is a key facilitator to leverage technical capabilities of loose coupling to ...
Ulrich Scholten, Robin Fischer, Christian Zirpins
CSMR
2008
IEEE
15 years 7 months ago
How Lisp Systems Look Different
Many reverse engineering approaches have been developed to analyze software systems written in different languages like C/C++ or Java. These approaches typically rely on a meta-mo...
Adrian Dozsa, Tudor Gîrba, Radu Marinescu
121
Voted
DAMON
2007
Springer
15 years 7 months ago
The five-minute rule twenty years later, and how flash memory changes the rules
In 1987, Gray and Putzolo presented the five-minute rule, which was reviewed and renewed ten years later in 1997. With the advent of flash memory in the gap between traditional RA...
Goetz Graefe
79
Voted
MSR
2006
ACM
15 years 6 months ago
How long did it take to fix bugs?
The number of bugs (or fixes) is a common factor used to measure the quality of software and assist bug related analysis. For example, if software files have many bugs, they may b...
Sunghun Kim, E. James Whitehead Jr.