Sciweavers

232 search results - page 37 / 47
» Twenty Years Later
Sort
View
VLDB
2005
ACM
119views Database» more  VLDB 2005»
15 years 4 months ago
Database-Inspired Search
“W3QL: A Query Language for the WWW”, published in 1995, presented a language with several distinctive features. Employing existing indexes as access paths, it allowed the sel...
David Konopnicki, Oded Shmueli
FSE
2004
Springer
115views Cryptology» more  FSE 2004»
15 years 4 months ago
Correlation Attacks Using a New Class of Weak Feedback Polynomials
In 1985 Siegenthaler introduced the concept of correlation attacks on LFSR based stream ciphers. A few years later Meier and Staffelbach demonstrated a special technique, usually ...
Håkan Englund, Martin Hell, Thomas Johansson
ISESE
2003
IEEE
15 years 4 months ago
Building Pair Programming Knowledge through a Family of Experiments
Pair programming is a practice in which two programmers work collaboratively at one computer on the same design, algorithm, code, or test. Pair programming is becoming increasingl...
Laurie A. Williams, Charlie McDowell, Nachiappan N...
INDOCRYPT
2003
Springer
15 years 4 months ago
Security Analysis of Several Group Signature Schemes
At Eurocrypt’91, Chaum and van Heyst introduced the concept of group signature. In such a scheme, each group member is allowed to sign messages on behalf of a group anonymously. ...
Guilin Wang
RE
2009
Springer
15 years 3 months ago
Improving the Exchange of Requirements and Specifications between Business Partners
Increasingly complex supplier-relationships dominate product development, independent of industries and products. Mostly the primary source of risks and later problems is insuffic...
Manuel Reis Monteiro, Christof Ebert, Matthias Rec...