Sciweavers

2173 search results - page 134 / 435
» On the Values of Reducibility Candidates
Sort
View
DIS
1999
Springer
15 years 2 months ago
Discovery of a Set of Nominally Conditioned Polynomials
: This paper shows that a connectionist law discovery method called RF5X can discover a law in the form of a set of nominally conditioned polynomials, from data containing both nom...
Ryohei Nakano, Kazumi Saito
IWPC
1997
IEEE
15 years 2 months ago
Identifying objects in legacy systems
Many organisations are migrating towards object-oriented technology. However, owing to the business value of legacy software, new object-oriented development has to be weighed aga...
Aniello Cimitile, Andrea De Lucia, Giuseppe A. Di ...
CTRSA
2007
Springer
153views Cryptology» more  CTRSA 2007»
15 years 1 months ago
Differential Power Analysis of Stream Ciphers
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream cipher...
Wieland Fischer, Berndt M. Gammel, O. Kniffler, J....
EGICE
2006
15 years 1 months ago
Combining Two Data Mining Methods for System Identification
System identification is an abductive task which is affected by several kinds of modeling assumptions and measurement errors. Therefore, instead of optimizing values of parameters ...
Sandro Saitta, Benny Raphael, Ian F. C. Smith
ISSA
2008
14 years 11 months ago
Application of Message Digests for the Verification of Logical Forensic Data
A message digest is a fixed length output produced by applying a cryptographic algorithm on input binary data of arbitrary length. If the input data changes even by one bit, the g...
Pontjho Mokhonoana, Martin S. Olivier