Sciweavers

154 search results - page 18 / 31
» The Software Performance of Authenticated-Encryption Modes
Sort
View
ICEIS
2003
IEEE
15 years 7 months ago
An Agent-Mediated Marketplace for Transportation Transactions
This paper reports on the development of an innovative agent-mediated electronic marketplace, which is able to efficiently handle transportation transactions of various types. Soft...
Nikos I. Karacapilidis, Alexis Lazanas, Pavlos Mor...
RTAS
1995
IEEE
15 years 5 months ago
ControlShell: component-based real-time programming
Real-time system software is notoriously hard to share and reuse. This paper walks through the methodology and application of ControlShell, a component-based programming system re...
Stanley A. Schneider, Vincent W. Chen, Gerardo Par...
TSE
1998
93views more  TSE 1998»
15 years 1 months ago
Xception: A Technique for the Experimental Evaluation of Dependability in Modern Computers
An important step in the development of dependable systems is the validation of their fault tolerance properties. Fault injection has been widely used for this purpose, however wi...
Joao Carreira, Henrique Madeira, João Gabri...
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
15 years 6 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
ICSE
2012
IEEE-ACM
13 years 4 months ago
Debugger Canvas: Industrial experience with the code bubbles paradigm
—At ICSE 2010, the Code Bubbles team from Brown University and the Code Canvas team from Microsoft Research presented similar ideas for new user experiences for an integrated dev...
Robert DeLine, Andrew Bragdon, Kael Rowan, Jens Ja...