of modern businesses, separation of concern mechanisms and abstractions are needed. iven development (MDD) approaches utilize abstraction and transformation to handle ty. In MDD, s...
Arnor Solberg, Devon M. Simmonds, Raghu Reddy, Rob...
Abstract. We consider the framework of stochastic multi-armed bandit problems and study the possibilities and limitations of strategies that explore sequentially the arms. The stra...
Abstract. In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complementation of whole registers turns out to be very useful for constructing...
Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, S...
Abstract. The Pie Segment Slider is a novel parameter control interface combining the advantages of tangible input with the customizability of a graphical interface representation....
Abstract. At DRM 2002, Chow et al. [4] presented a method for implementing the DES block cipher such that it becomes hard to extract the embedded secret key in a white-box attack c...
Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart P...