Sciweavers

1638 search results - page 115 / 328
» Properties of input-consuming derivations
Sort
View
IACR
2011
88views more  IACR 2011»
13 years 9 months ago
GCM, GHASH and Weak Keys
The Galois/Counter Mode (GCM) of operation has been standardized by NIST to provide single-pass authenticated encryption. The GHASH authentication component of GCM belongs to a cla...
Markku-Juhani O. Saarinen
ER
1999
Springer
104views Database» more  ER 1999»
15 years 2 months ago
A Taxonomy of Recursive Relationships and Their Structural Validity in ER Modeling
Abstract. In this paper, we present the complete classification of recursive relationships and the criteria that contribute to the structural validity of modeling recursive relatio...
James Dullea, Il-Yeol Song
FM
1999
Springer
161views Formal Methods» more  FM 1999»
15 years 2 months ago
Combining Theorem Proving and Continuous Models in Synchronous Design
Support for system speci cation in terms of modelling and simulation environments has become a common practice in safety-critical applications. Also, a current trend is the automat...
Simin Nadjm-Tehrani, Ove Åkerlund
PLILP
1994
Springer
15 years 2 months ago
Combining Lazy Narrowing with Disequality Constraints
Abstract. We investigate an extension of a lazy functional logic language, which uses term disequations both in programs and in computed answers. The semantic properties of the lan...
Puri Arenas-Sánchez, Ana Gil-Luezas, Franci...
DAC
1989
ACM
15 years 2 months ago
A New Approach to the Rectilinear Steiner Tree Problem
: We discuss a new approach to constructing the rectilinear Steiner tree (RST) of a given set of points in the plane, starting from a minimum spanning tree (MST). The main idea in ...
Jan-Ming Ho, Gopalakrishnan Vijayan, C. K. Wong