Sciweavers

2163 search results - page 86 / 433
» cases 2004
Sort
View
ICISC
2004
120views Cryptology» more  ICISC 2004»
14 years 11 months ago
Algebraic Attacks on Combiners with Memory and Several Outputs
Algebraic attacks on stream ciphers [14] recover the key by solving an overdefined system of multivariate equations. Such attacks can break several interesting cases of LFSR-based ...
Nicolas Courtois
LWA
2004
14 years 11 months ago
A Practical Application of Ontologies for Knowledge Sharing and Trading
This paper describes why and how an ontology facilitates the sharing and trading of knowledge. It intoduces the underlying concept of a knowledge market place and how an ontology ...
Bertin Klein, Ralph Traphöner
PTS
2004
88views Hardware» more  PTS 2004»
14 years 11 months ago
From Design to Test with UML: Applied to a Roaming Algorithm for Bluetooth Devices
The UML Testing Profile provides support for UML based model-driven testing. This paper introduces a methodology of how to use the testing profile in order to modify and extend an ...
Zhen Ru Dai, Jens Grabowski, Helmut Neukirchen, Ho...
ADCM
2004
58views more  ADCM 2004»
14 years 9 months ago
Classification of Bivariate Configurations with Simple Lagrange Interpolation Formulae
In 1977 Chung and Yao introduced a geometric characterization in multivariate interpolation in order to identify distributions of points such that the Lagrange functions are produc...
Jesús M. Carnicer, Mariano Gasca
APPML
2004
84views more  APPML 2004»
14 years 9 months ago
Renormalization group methods for nonlinear parabolic equations
ABSTRACT.Renormalization group (RG) methods are described for determining the key exponents related to the decay of solutions to nonlinear parabolic differential equations. Higher ...
H. Merdan, G. Caginalp