Sciweavers

2783 search results - page 272 / 557
» The Nature Of Near-Synonymic Relations
Sort
View
SCAM
2008
IEEE
15 years 8 months ago
Exploiting the Correspondence between Micro Patterns and Class Names
This paper argues that semantic information encoded in natural language identifiers is a largely neglected resource for program analysis. First we show that words in Java class n...
Jeremy Singer, Chris C. Kirkham
SEAA
2008
IEEE
15 years 8 months ago
A Meta-model for the Assessment of Non-Functional Requirement Size
Non-functional requirements (NFRs) pose unique challenges in estimating the effort it would take to implement them. This is mainly because of their unique nature; NFRs are subject...
Mohamad Kassab, Maya Daneva, Olga Ormandjieva
ACISP
2008
Springer
15 years 8 months ago
Looking Back at a New Hash Function
Abstract. We present two (related) dedicated hash functions that deliberately borrow heavily from the block ciphers that appeared in the final stages of the AES process. We explor...
Olivier Billet, Matthew J. B. Robshaw, Yannick Seu...
ACNS
2008
Springer
121views Cryptology» more  ACNS 2008»
15 years 8 months ago
Anonymity in Transferable E-cash
Regular cash systems provide both the anonymity of users and the transferability of coins. In this paper, we study the anonymity properties of transferable e-cash. We define two n...
Sébastien Canard, Aline Gouget
FDL
2007
IEEE
15 years 8 months ago
Time Modeling in MARTE
This article introduces the Time Model subprofile of MARTE, a new OMG UML Profile dedicated to Modeling and Analysis of Real-Time and Embedded systems. After a brief presentatio...
Robert de Simone, Charles André