|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 4266 occurrences of 2412 keywords
|
|
|
Results
Found 12285 publication records. Showing 12248 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
78 | Ran Raz, Amir Shpilka |
On the Power of Quantum Proofs. |
CCC |
2004 |
DBLP DOI BibTeX RDF |
|
74 | Laurent Granvilliers, Frédéric Goualard, Frédéric Benhamou |
Box Consistency through Weak Box Consistency. |
ICTAI |
1999 |
DBLP DOI BibTeX RDF |
box consistency, constraint satisfaction, constraint propagation, numerical constraint |
73 | Jun Wu, Yong-Bin Kim, Minsu Choi |
Low-power side-channel attack-resistant asynchronous S-box design for AES cryptosystems. |
ACM Great Lakes Symposium on VLSI |
2010 |
DBLP DOI BibTeX RDF |
substitution box, substitution box (S-box), differential power/noise analysis, power/noise measurement, security, advanced encryption standard, advanced encryption standard, side-channel attacks (SCA), null convention logic |
71 | Wil Michiels, Paul Gorissen |
Mechanism for software tamper resistance: an application of white-box cryptography. |
Digital Rights Management Workshop |
2007 |
DBLP DOI BibTeX RDF |
software tamper resistance, white-box cryptography, software protection |
66 | Sergei Kojarski, David H. Lorenz |
Comparing White-Box, Black-Box, and Glass-Box Composition of Aspect Mechanisms. |
ICSR |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Md. Saidur Rahman 0001, Shin-Ichi Nakano, Takao Nishizeki |
Box-Rectangular Drawings of Plane Graphs. |
WG |
1999 |
DBLP DOI BibTeX RDF |
Rectangular Drawing, Box-drawing, Box-rectangular drawing, Algorithm, Graph, Graph Drawing |
58 | Bogdan Korel |
Black-Box Understanding of COTS Components. |
IWPC |
1999 |
DBLP DOI BibTeX RDF |
Black-Box understanding, Interface probing, Black-box testing, Automated test generation, COTS component, White-box testing |
58 | Jianqiang Zhuo, Paul W. Oman, Ramkumar V. Pichai, Sujay Sahni |
Using Relative Complexity To Allocate Resources In Gray-Box Testing Of Object-Oriented Code. |
IEEE METRICS |
1997 |
DBLP DOI BibTeX RDF |
gray box testing, object oriented code, software testing costs, relative complexity metric, software quality assessments, industrial C++ software subsystem, rank order, minor test areas, relative test complexity, reliability, object-oriented programming, resource allocation, maintainability, black box, white box testing, testing engineers |
57 | M. J. Box, R. M. Box |
Computation of the Variance Ratio Distribution. |
Comput. J. |
1969 |
DBLP DOI BibTeX RDF |
|
56 | Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank |
Black-box constructions for secure computation. |
STOC |
2006 |
DBLP DOI BibTeX RDF |
theory of cryptography, oblivious transfer, secure computation, black-box reductions |
55 | Steven Halim, Roland H. C. Yap, Hoong Chuin Lau |
An Integrated White+Black Box Approach for Designing and Tuning Stochastic Local Search. |
CP |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Seok-Yong Jin, Jong-Min Baek, Hong-Yeop Song |
Improved Rijndael-Like S-Box and Its Transform Domain Analysis. |
SETA |
2006 |
DBLP DOI BibTeX RDF |
Avalanche transform, AES, S-box, Rijndael, Hadamard transform |
52 | Stefan Tillich, Martin Feldhofer, Thomas Popp, Johann Großschädl |
Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box. |
J. Signal Process. Syst. |
2008 |
DBLP DOI BibTeX RDF |
substitution box (S-box), inversion in the finite field GF($28$), standard cell implementation, Advanced Encryption Standard (AES), power consumption, silicon area, critical path delay |
51 | Alireza Entezari, Torsten Möller |
Extensions of the Zwart-Powell Box Spline for Volumetric Data Reconstruction on the Cartesian Lattice. |
IEEE Trans. Vis. Comput. Graph. |
2006 |
DBLP DOI BibTeX RDF |
Volumetric data interpolation, reconstruction, box splines |
50 | Aggelos Kiayias, Moti Yung |
Self Protecting Pirates and Black-Box Traitor Tracing. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Renfei Liu, Keshab K. Parhi |
Fast composite field S-box architectures for advanced encryption standard. |
ACM Great Lakes Symposium on VLSI |
2008 |
DBLP DOI BibTeX RDF |
advanced encryption standard (aes), composite finite field, s-box, precomputation |
46 | Svetla Nikova, Vincent Rijmen, Martin Schläffer |
Using Normal Bases for Compact Hardware Implementations of the AES S-Box. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
AES, hardware implementation, S-box, normal basis |
46 | Jean-Pierre Croisille |
A Hermitian Box-scheme for One-dimensional Elliptic Equations - Application to Problems with High Contrasts in the Ellipticity. |
Computing |
2006 |
DBLP DOI BibTeX RDF |
Box-scheme, porous media equation, Keller box-scheme, high-order compact scheme, hermitian scheme, Mehrstellenverfahren, finite volume method, collocation method, mixed method, elliptic problems |
45 | Per Kristian Lehre, Carsten Witt |
Black-box search by unbiased variation. |
GECCO |
2010 |
DBLP DOI BibTeX RDF |
black-box complexity, runtime analysis |
45 | Minho Kim, Jörg Peters 0001 |
Fast and stable evaluation of box-splines via the BB-form. |
Numer. Algorithms |
2009 |
DBLP DOI BibTeX RDF |
Exact evaluation, Rational coefficients, Bernstein-Bézier-form, Face-centered cubic lattice, Spline, Box-spline |
45 | Ueli M. Maurer, Dominik Raub |
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Black-box fields, computational algebra, homomorphic encryption, generic algorithms, one-way permutations |
45 | Hongbing Fan, Jiping Liu, Yu-Liang Wu |
General Models and a Reduction Design Technique for FPGA Switch Box Designs. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
hyper-universal, FPGA, global routing, detailed routing, reduction technique, optimum design, switch box |
45 | Adam L. Young, Moti Yung |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography |
45 | Sami Beydeda, Volker Gruhn, Michael Stachorski |
A Graphical Class Representation for Integrated Black- and White-Box Testing. |
ICSM |
2001 |
DBLP DOI BibTeX RDF |
Class-level testing, integrated black- and white-box testing, selective regression testing, test suite reduction |
45 | Ja-Young Sung, Aaron M. Levisohn, Ji-won Song, Ben Tomassetti, Ali Mazalek |
Shadow Box: an interactive learning toy for children. |
DIGITEL |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau |
Information and Control in Gray-Box Systems. |
SOSP |
2001 |
DBLP DOI BibTeX RDF |
|
43 | Achim D. Brucker, Burkhart Wolff |
Interactive Testing with HOL-TestGen. |
FATES |
2005 |
DBLP DOI BibTeX RDF |
symbolic test case generations, theorem proving, black box testing, white box testing, interactive testing |
43 | Steven S. Seiden, Rob van Stee |
New Bounds for Multidimensional Packing. |
Algorithmica |
2003 |
DBLP DOI BibTeX RDF |
Box packing, Approximation algorithms, Online algorithms, Bin packing |
42 | Wil Michiels |
Opportunities in White-Box Cryptography. |
IEEE Secur. Priv. |
2010 |
DBLP DOI BibTeX RDF |
black-box cryptography, gray-box cryptography, white-box cryptography, crypto corner, cryptography, security & privacy |
42 | Hoijin Yoon, Byoungju Choi |
An Effective Testing Technique for Component Composition in EJBs. |
APSEC |
2001 |
DBLP DOI BibTeX RDF |
|
41 | Debojyoti Bhattacharya, Nitin Bansal, Amitava Banerjee, Dipanwita Roy Chowdhury |
A Near Optimal S-Box Design. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Cellular Automata, Algebraic Attack, S-box, Power Attack |
41 | Jaekyu Ha, Robert M. Haralick, Ihsin T. Phillips |
Document page decomposition by the bounding-box project. |
ICDAR |
1995 |
DBLP DOI BibTeX RDF |
document page decomposition, bounding-box project, words extraction, textlines, text blocks, spatial configuration, black pixels, clustering problem, 2-dimensional discrete domain, document decomposition hierarchy, image segmentation, image segmentation, document image analysis, document image, bounding box |
40 | Rafael Pass, Hoeteck Wee |
Black-Box Constructions of Two-Party Protocols from One-Way Functions. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
black-box constructions, zero-knowledge arguments, trapdoor commitments, parallel coin-tossing, non-malleable commitments, secure two-party computation |
40 | Huafei Zhu |
Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Black-box constructions, defensible adversary, malicious adversary, oblivious transfer protocols |
40 | Jun Furukawa 0001, Nuttapong Attrapadung |
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys. |
ICALP |
2007 |
DBLP DOI BibTeX RDF |
Fully Collusion Resistant, Revocation, Traitor Tracing, Black-Box |
40 | Tatsuyuki Matsushita, Hideki Imai |
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
Hierarchical key assignment, black-box tracing, reduced ciphertext size |
40 | Amrit Tiwana |
Beyond the Black Box: Knowledge Overlaps in Software Outsourcing. |
IEEE Softw. |
2004 |
DBLP DOI BibTeX RDF |
congruence framework, software project risk, black-box development, knowledge management, software development, outsourcing |
40 | Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi |
Cryptanalysis of a White Box AES Implementation. |
Selected Areas in Cryptography |
2004 |
DBLP DOI BibTeX RDF |
white box, implementation, block ciphers, AES, tamper resistance, software piracy |
40 | Tatsuyuki Matsushita, Hideki Imai |
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
Public-key traitor tracing, Black-box tracing, Self-defensive pirates |
40 | Elena Montañés, José Ramón Quevedo, Maria M. Prieto, César O. Menéndez |
Forecasting Time Series Combining Machine Learning and Box-Jenkins Time Series. |
IBERAMIA |
2002 |
DBLP DOI BibTeX RDF |
Box-Jenkins Time Series, Continuous Machine Learning Systems, Neural Networks, Forecasting |
40 | Tatsuyuki Matsushita |
A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
Flexible revocation, Black-box tracing, Traitor tracing |
40 | Sami Beydeda, Volker Gruhn |
Integrating White- and Black-Box Techniques for Class-Level Regression Testing. |
COMPSAC |
2001 |
DBLP DOI BibTeX RDF |
Integrated White- and Black-Box Testing, Class-level Testing, Regression Testing |
40 | Mehran Mozaffari Kermani, Arash Reyhani-Masoleh |
A Low-Power High-Performance Concurrent Fault Detection Approach for the Composite Field S-Box and Inverse S-Box. |
IEEE Trans. Computers |
2011 |
DBLP DOI BibTeX RDF |
inverse S-box, fault detection, Advanced encryption standard, S-box, composite fields |
39 | Hiroshi Kudou, Shunn-ichiro Nakayama, Atsushi Watanabe, Tomoyuki Nagase, Yoshio Yoshioka |
A Reconfigurable-Permutation Algorithm for M_S-Box. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Herman J. Haverkort, Freek van Walderveen |
Locality and Bounding-Box Quality of Two-Dimensional Space-Filling Curves. |
ESA |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi 0001, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani |
Compact and Secure Design of Masked AES S-Box. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
Composite field arithmetic, AES, Side-Channel Attack, Masking |
39 | Sumio Morioka, Akashi Satoh |
A 10-Gbps full-AES crypto design with a twisted BDD S-Box architecture. |
IEEE Trans. Very Large Scale Integr. Syst. |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Sumio Morioka, Akashi Satoh |
A 10 Gbps Full-AES Crypto Design with a Twisted-BDD S-Box Architecture. |
ICCD |
2002 |
DBLP DOI BibTeX RDF |
|
38 | Yehuda Lindell |
Lower Bounds and Impossibility Results for Concurrent Self Composition. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Self and general composition, Non-black-box and black-box simulation, Lower bounds, Secure computation, Protocol composition, Impossibility results |
38 | Susan S. Chen, James M. Keller, Richard M. Crownover |
On the Calculation of Fractal Features from Images. |
IEEE Trans. Pattern Anal. Mach. Intell. |
1993 |
DBLP DOI BibTeX RDF |
fractal feature calculation, box size lower bound, image characteristics, fractal surfaces, mass density function, box counting, feature extraction, parameter estimation, images, fractals, heuristic approach, fractal geometry |
37 | Hongbing Fan, Yu-Liang Wu, Ray Chak-Chung Cheung, Jiping Liu |
Decomposition Design Theory and Methodology for Arbitrary-Shaped Switch Boxes. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
reconfigurable interconnection network, switch block, hyperuniversal, FPGA, universal, switch box |
37 | Charles R. Tolle, Timothy R. McJunkin, David J. Gorisch |
Suboptimal Minimum Cluster Volume Cover-Based Method for Measuring Fractal Dimension. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2003 |
DBLP DOI BibTeX RDF |
suboptimal cover, box counting, clustering, texture analysis, Fuzzy-C means, Fractal dimension |
36 | Aasia Riasat, Syed Sajjad Rizvi, Farheen Zehara, Faraz Arain |
The Role of System Dynamics in Learning Environments. |
Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Aggelos Kiayias, Moti Yung |
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract. |
Digital Rights Management Workshop |
2008 |
DBLP DOI BibTeX RDF |
error correcting codes, traitor tracing |
36 | Amos Beimel, Tal Malkin |
A Quantitative Approach to Reductions in Secure Computation. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Huo Yan Chen, T. H. Tse, F. T. Chan, Tsong Yueh Chen |
In Black and White: An Integrated Approach to Class-Level Testing of Object-Oriented Programs. |
ACM Trans. Softw. Eng. Methodol. |
1998 |
DBLP DOI BibTeX RDF |
software-testing methodologies, object-oriented programming, abstract data types, algebraic specification, observational equivalence |
36 | David Canright, Lejla Batina |
A Very Compact "Perfectly Masked" S-Box for AES. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
composite Galois field, AES, DPA, S-box, masking |
36 | Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede |
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
inversion in GF(2n), smart card implementation, AES, S-box, composite fields |
36 | Luiz Velho 0001 |
Semi-Regular 4-8 Refinement and Box Spline Surfaces. |
SIBGRAPI |
2000 |
DBLP DOI BibTeX RDF |
semi-regular 4-8 refinement, box spline surfaces, mesh refinement method, semiregular 3-direction hierarchical structure, control meshes, 2D manifolds, conforming variable-resolution mesh extraction, spatially varying adaptation functions, generalized four direction box spline surfaces, subdivision surfaces, splines (mathematics), smoothing method, arbitrary topology, subdivision scheme |
35 | Ian T. Foster |
Computing outside the box. |
ICS |
2009 |
DBLP DOI BibTeX RDF |
computing outside the box |
35 | Gerald Kotonya |
An Architecture-Centric Development Environment for Black-Box Component-Based Systems. |
ECSA |
2008 |
DBLP DOI BibTeX RDF |
black-box components, architecture, Development environment |
35 | Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang |
On Secure Multi-party Computation in Black-Box Groups. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Planar Graph, Graph Colouring, Black-Box, Multi-Party Computation, Non-Abelian Group |
35 | Wayne Eberly, Mark Giesbrecht, Pascal Giorgi, Arne Storjohann, Gilles Villard |
Faster inversion and other black box matrix computations using efficient block projections. |
ISSAC |
2007 |
DBLP DOI BibTeX RDF |
black box linear algebra, linear system solving, sparse integer matrix, structured integer matrix |
35 | Kwang Ik Seo, Eun Man Choi |
Comparison of Five Black-box Testing Methods for Object-Oriented Software. |
SERA |
2006 |
DBLP DOI BibTeX RDF |
Comparison of testing methods, Performance of testing methods, Specification-based test, Black-box test |
35 | Conor Nugent, Padraig Cunningham |
A Case-Based Explanation System for Black-Box Systems. |
Artif. Intell. Rev. |
2005 |
DBLP DOI BibTeX RDF |
black-box systems, case-based reasoning, explanation |
35 | Aurelian Bejancu, Malcolm A. Sabin |
Maximal approximation order for a box-spline semi-cardinal interpolation scheme on the three-direction mesh. |
Adv. Comput. Math. |
2005 |
DBLP DOI BibTeX RDF |
not-a-knot, semi-cardinal, Wiener-Hopf, boundary conditions, difference equations, multivariable interpolation, approximation order, box splines |
35 | Mark Last, Shay Eyal, Abraham Kandel |
Effective Black-Box Testing with Genetic Algorithms. |
Haifa Verification Conference |
2005 |
DBLP DOI BibTeX RDF |
Genetic algorithms, Fuzzy logic, Computational intelligence, Black-box testing, Test prioritization |
35 | Hongbing Fan, Yu-Liang Wu, Chak-Chung Cheung, Jiping Liu |
On Optimal Irregular Switch Box Designs. |
FPL |
2004 |
DBLP DOI BibTeX RDF |
FPGA, Configurable computing, on-chip network, switch box |
35 | Shoichi Hirose |
Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
block cipher, black-box model, double-block-length hash function |
35 | Aman Shaikh, Albert G. Greenberg |
Experience in black-box OSPF measurement. |
Internet Measurement Workshop |
2001 |
DBLP DOI BibTeX RDF |
SPF calculation, black-box measurements, routing, OSPF |
35 | Patrick J. Schroeder, Bogdan Korel |
Black-box test reduction using input-output analysis. |
ISSTA |
2000 |
DBLP DOI BibTeX RDF |
input-output analysis, test reduction, black-box testing, combinatorial testing |
35 | Zhonglin He, Geoff Staples, Margaret Ross 0001, Ian Court |
Software Black Box Mechanism: A Pragmatic Method for Software Crash Diagnosis and Usage Maintenance Testing. |
ICSM |
1997 |
DBLP DOI BibTeX RDF |
software maintenance testing, software usage testing, software crash diagnosis, software black box mechanism |
34 | Mehran Mozaffari Kermani, Arash Reyhani-Masoleh |
A low-cost S-box for the Advanced Encryption Standard using normal basis. |
EIT |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Neil A. Dodgson, Ursula H. Augsdörfer, Thomas J. Cashman 0001, Malcolm A. Sabin |
Deriving Box-Spline Subdivision Schemes. |
IMA Conference on the Mathematics of Surfaces |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Iftach Haitner |
Semi-honest to Malicious Oblivious Transfer - The Black-Box Way. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Yan He, Dmitri D. Perkins, Bin Huang |
S-Box: A scalability analysis framework for ad hoc routing protocols. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Xuxian Jiang, Xinyuan Wang 0005, Dongyan Xu |
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
virtual machines, malware detection, rootkits |
34 | Atsushi Watanabe, Hiroshi Haruki, Shun Shimotomai, Takeshi Saito, Tomoyuki Nagase, Yoshio Yoshioka, Yoshiei Hasegawa |
A New Mutable Nonlinear Transformation Algorithm for S-box. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Xin Han, Kazuo Iwama, Rolf Klein, Andrzej Lingas |
Approximating the Maximum Independent Set and Minimum Vertex Coloring on Box Graphs. |
AAIM |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Boaz Barak |
Non-black-box Techniques in Cryptography. |
CSR |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Akihiro Mikoda, Shuichi Inokuchi, Yoshihiro Mizoguchi, Mitsuhiko Fujio |
The Number of Orbits of Periodic Box-Ball Systems. |
UC |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Mehran Mozaffari Kermani, Arash Reyhani-Masoleh |
Parity-Based Fault Detection Architecture of S-box for Advanced Encryption Standard. |
DFT |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Wei Shi, Wanlei Zhou 0001 |
Frequency Distribution of TATA Box and Extension Sequences on Human Promoters. |
IMSCCS (1) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Sandeep Uttamchandani, Xiaoxin Yin, John Palmer, Gul A. Agha |
Monitormining: creating domain knowledge for system automation using a gray-box approach. |
Integrated Network Management |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Zhanfei Zhou |
Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Frank Lammermann, Stefan Wappler |
Benefits of software measures for evolutionary white-box testing. |
GECCO |
2005 |
DBLP DOI BibTeX RDF |
metric, software measurement, evolutionary testing, automated test case generation |
34 | Jingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang |
An AES S-Box to Increase Complexity and Cryptographic Analysis. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
34 | David Canright |
A Very Compact S-Box for AES. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Runjie Shen, Wen He, Guangqing Wang, Zichen Chen |
Simulation and experiment on temperature control of temperature box in centrifugal field. |
ICARCV |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Pankaj K. Agarwal, Mark de Berg, Joachim Gudmundsson, Mikael Hammar, Herman J. Haverkort |
Box-Trees and R-Trees with Near-Optimal Query Time. |
Discret. Comput. Geom. |
2002 |
DBLP DOI BibTeX RDF |
|
34 | Ronald Cramer, Serge Fehr |
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
34 | Pankaj K. Agarwal, Mark de Berg, Joachim Gudmundsson, Mikael Hammar, Herman J. Haverkort |
Box-trees and R-trees with near-optimal query time. |
SCG |
2001 |
DBLP DOI BibTeX RDF |
|
34 | B. David Saunders |
Black box methods for least squares problems. |
ISSAC |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Martin Hesketh, Maciej Koutny |
An Axiomatisation of Duplication Equivalence in the Petri Box Calculus. |
ICATPN |
1998 |
DBLP DOI BibTeX RDF |
Net-based algebra, analysis of structure of nets, verification using nets, equivalence and axiomatisation |
33 | Mehran Mozaffari Kermani, Arash Reyhani-Masoleh |
A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
fault detection, Advanced encryption standard, S-box, normal basis |
33 | Arvind S. Krishna, Balachandran Natarajan, Aniruddha S. Gokhale, Douglas C. Schmidt, Nanbor Wang, Gautam H. Thaker |
CCMPerf: A Benchmarking Tool for CORBA Component Model Implementations. |
Real Time Syst. |
2005 |
DBLP DOI BibTeX RDF |
CCMPerf, white-box metrics, black-box metrics, benchmarking, CCM |
33 | Arvind S. Krishna, Balachandran Natarajan, Aniruddha S. Gokhale, Douglas C. Schmidt, Nanbor Wang, Gautam H. Thaker |
CCMPerf: A Benchmarking Tool for CORBA Component Model Implementations. |
IEEE Real-Time and Embedded Technology and Applications Symposium |
2004 |
DBLP DOI BibTeX RDF |
CCMPerf, white-box metrics, black-box metrics, Benchmarking, CCM |
33 | Stéphane Ducasse, Thomas Hofmann, Oscar Nierstrasz |
OpenSpaces: An Object-Oriented Framework for Reconfigurable Coordination Spaces. |
COORDINATION |
2000 |
DBLP DOI BibTeX RDF |
White Box Reuse, Black Box Reuse, Frameworks, Dynamic Reconfiguration, Object-Oriented Languages |
33 | John Esch |
Contexts and Concepts, Abstraction Duals. |
ICCS |
1994 |
DBLP DOI BibTeX RDF |
White Box, Relation Instances, Contexts, Aggregations, Contraction, Concepts, Conceptual Graphs, Expansion, Black Box, Individuals |
33 | Barry W. Boehm, Philip N. Papaccio |
Understanding and Controlling Software Costs. |
IEEE Trans. Software Eng. |
1988 |
DBLP DOI BibTeX RDF |
glass-box, cost distribution, integrated software productivity, software productivity opportunity tree, software budgets, end-user system objectives, software engineering, software productivity, value chain, DP management, black-box, quality improvement, software costs, influence-function |
Displaying result #1 - #100 of 12248 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|