Sciweavers

2629 search results - page 410 / 526
» complex 2009
Sort
View
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
15 years 1 months ago
Differential Attack on Five Rounds of the SC2000 Block Cipher
The SC2000 block cipher has a 128-bit block size and a user key of 128, 192 or 256 bits, which employs a total of 6.5 rounds if a 128bit user key is used. It is a CRYPTREC recommen...
Jiqiang Lu
COORDINATION
2009
Springer
15 years 1 months ago
Automata for Context-Dependent Connectors
Abstract. Recent approaches to component-based software engineering employ coordinating connectors to compose components into software systems. For maximum flexibility and reuse, s...
Marcello M. Bonsangue, Dave Clarke, Alexandra Silv...
CSIE
2009
IEEE
15 years 1 months ago
The Pilot Way to Grid Resources Using glideinWMS
Grid computing has become very popular in big and widespread scientific communities with high computing demands, like high energy physics. Computing resources are being distribute...
Igor Sfiligoi, Daniel C. Bradley, Burt Holzman, Pa...
DLOG
2009
15 years 1 months ago
A Matter of Principles: Towards the Largest DLP Possible
Abstract. Description Logic Programs (DLP) have been described as a description logic (DL) that is in the "expressive intersection" of DL and datalog. This is a very weak...
Markus Krötzsch, Sebastian Rudolph
DLOG
2009
15 years 1 months ago
Reasoning About Typicality in ALC and EL
In this work we summarize our recent results on extending Description Logics for reasoning about prototypical properties and inheritance with exceptions. First, we focus our attent...
Laura Giordano, Valentina Gliozzi, Nicola Olivetti...