Sciweavers

2086 search results - page 306 / 418
» Principles of Software Evolution
Sort
View
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
15 years 6 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
EUROSYS
2007
ACM
15 years 6 months ago
Discrete control for safe execution of IT automation workflows
As information technology (IT) administration becomes increasingly complex, workflow technologies are gaining popularity for IT automation. Writing correct workflow programs is no...
Yin Wang, Terence Kelly, Stéphane Lafortune
ESE
2007
99views Database» more  ESE 2007»
15 years 2 months ago
An empirical study of cycles among classes in Java
Many authors have implied dependency cycles are widespread among the classes of object-oriented software systems. Proponents of the design principle Avoid cyclic dependencies amon...
Hayden Melton, Ewan D. Tempero

Publication
139views
15 years 2 months ago
Separation of concerns in compiler development using aspect-orientation
A major difficulty in compiler development regards the proper modularization of concerns among the various compiler phases. The traditional object-oriented development paradigm ha...
INFSOF
2010
112views more  INFSOF 2010»
15 years 29 days ago
Experimental program analysis
Program analysis techniques are used by software engineers to deduce and infer characteristics of software systems. Recent research has suggested that certain program analysis tec...
Joseph R. Ruthruff, Sebastian G. Elbaum, Gregg Rot...