|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7022 occurrences of 3995 keywords
|
|
|
Results
Found 8030 publication records. Showing 8030 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
58 | Ahmad-Reza Sadeghi, Michael Steiner 0001 |
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding, pp. 244-261, 2001, Springer, 3-540-42070-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Cryptographic Assumptions, Square Exponent, Inverse Exponent, Discrete Logarithms, Complexity Theory, Diffie-Hellman, Generic Algorithms |
54 | Robert D. King, Charles D. Turnitsa |
The landscape of assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim ![In: Proceedings of the 2008 Spring Simulation Multiconference, SpringSim 2008, Ottawa, Canada, April 14-17, 2008, pp. 81-88, 2008, SCS/ACM, 1-56555-319-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ontology, assumptions |
54 | Paola Inverardi, Alexander L. Wolf, Daniel Yankelevich |
Static checking of system behaviors using derived component assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 9(3), pp. 239-272, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
chemical abstract machine model, static analysis, component-based systems, assumptions |
48 | Keith W. Miller 0001, Larry J. Morell, Robert E. Noonan, Stephen K. Park, David M. Nicol, Branson W. Murrill, Jeffrey M. Voas |
Estimating the Probability of Failure When Testing Reveals No Failures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 18(1), pp. 33-43, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
failure probability estimation, random testing results, input distribution, prior assumptions, failure estimate, discrete sample space statistical model, Bayesian prior assumptions, life-critical applications, probability, program testing, Bayes methods, formulas |
46 | Michael Szydlo |
A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp. 166-170, 2006, Springer, 3-540-46255-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Chosen basis, Decisional Diffie-Hellman, Interactive assumptions |
46 | Sebastián Uchitel, Daniel Yankelevich |
Enhancing Architectural Mismatch Detection with Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: 7th IEEE International Symposium on Engineering of Computer-Based Systems (ECBS 2000), 3-7 April 2000, Edinburgh, Scotland, UK, pp. 138-, 2000, IEEE Computer Society, 0-7695-0604-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Verification, Software architectures, Safety Properties, Assumptions |
44 | Kimberly D. Voll, Tom P. Yeh, Verónica Dahl |
An assumptive logic programming methodology for parsing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAI ![In: 12th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2000), 13-15 November 2000, Vancouver, BC, Canada, pp. 11-18, 2000, IEEE Computer Society, 0-7695-0909-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
assumptive logic programming methodology, continuation based linear assumptions, timeless assumptions, datalog grammars, terse treatments, language processing phenomena, concise parser, numbered word boundaries, left-corner parsing, constituent coordination, AI, logic programming, theorem proving, DATALOG, error correction, grammars, test cases, charting, error diagnosis, proof of concept, logic grammars |
44 | Adriano Valenzano, Paolo Montuschi, Luigi Ciminiera |
Some Properties of Timed Token Medium Access Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(8), pp. 858-869, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
timed token medium access protocols, non-real-time traffic, worst-case values, average token rotation time, synchronous traffic, generic periodic pattern, heavy conditions, theoretical lower bounds, real networks, asynchronous overrun problem, multiple priority classes, worst-case assumptions, best-case assumptions, timed-token protocol parameters, network installation, protocols, throughput, local area network, real-time traffic, token networks, electronic messaging |
43 | Paolo Atzeni, Douglas Stott Parker Jr. |
Assumptions in Relational Database Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the ACM Symposium on Principles of Database Systems, March 29-31, 1982, Los Angeles, California, USA, pp. 1-9, 1982, ACM, 0-89791-070-2. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
|
39 | Maria Eleftheriou, Marios Mavronicolas |
Linearizability in the Presence of Drifting Clocks and Under Different Delay Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 13th International Symposium, Bratislava, Slovak Republic, September 27-29, 1999, Proceedings, pp. 327-341, 1999, Springer, 3-540-66531-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
39 | Bernhard Josko |
Modelchecking of CTL Formulae under Liveness Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 14th International Colloquium, ICALP87, Karlsruhe, Germany, July 13-17, 1987, Proceedings, pp. 280-289, 1987, Springer, 3-540-18088-5. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
39 | Jaimee Brown, Juan Manuel González Nieto, Colin Boyd |
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 176-190, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
RSA assumptions, public key encryption, chosen-ciphertext security |
39 | Samir Chouali, Jacques Julliand, Pierre-Alain Masson, Françoise Bellegarde |
PLTL-partitioned model checking for reactive systems under fairness assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 4(2), pp. 267-301, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
PLTL model checking, Refinement design, fairness assumptions, out-of-core model checking |
39 | Michel Abdalla, Bogdan Warinschi |
On the Minimal Assumptions of Group Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 1-13, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
minimal assumptions, Group signatures, one-way functions, trapdoor permutations |
35 | Jeffrey C. Carver, John Van Voorhis, Victor R. Basili |
Understanding the Impact of Assumptions on Experimental Validity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISESE ![In: 2004 International Symposium on Empirical Software Engineering (ISESE 2004), 19-20 August 2004, Redondo Beach, CA, USA, pp. 251-260, 2004, IEEE Computer Society, 0-7695-2165-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Claude Crépeau, Joe Kilian |
Weakening Security Assumptions and Oblivious Transfer (Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings, pp. 2-7, 1988, Springer, 3-540-97196-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
35 | Michel Abdalla, David Pointcheval |
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 341-356, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Password-based authentication, multi-party protocols, Diffie-Hellman assumptions |
34 | Björn Niehaves, Karsten Klose, Ralf Knackstedt, Jörg Becker 0001 |
Epistemological Perspectives on IS-Development - A Consensus-Oriented Approach on Conceptual Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wissensmanagement (LNCS Volume) ![In: Professional Knowledge Management, Third Biennial Conference, WM 2005, Kaiserslautern, Germany, April 10-13, 2005, Revised Selected Papers, pp. 635-646, 2005, Springer, 3-540-30465-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
IS research, epistemological assumptions, epistemological framework, consensus-oriented approach, conceptual modeling, IS development |
32 | Mikhail V. Solodov |
Global convergence of an SQP method without boundedness assumptions on any of the iterative sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Program. ![In: Math. Program. 118(1), pp. 1-12, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 90C30, 65K05 |
32 | Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh |
Using trust assumptions with security requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Requir. Eng. ![In: Requir. Eng. 11(2), pp. 138-151, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh |
The Effect of Trust Assumptions on the Elaboration of Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: 12th IEEE International Conference on Requirements Engineering (RE 2004), 6-10 September 2004, Kyoto, Japan, pp. 102-111, 2004, IEEE Computer Society, 0-7695-2174-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Claudio Bettini, Xiaoyang Sean Wang, Elisa Bertino, Sushil Jajodia |
Semantic Assumptions and Query Evaluation in Temporal Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, San Jose, California, USA, May 22-25, 1995., pp. 257-268, 1995, ACM Press, 978-0-89791-731-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
MQL |
31 | Giovanni Di Crescenzo |
Minimal Assumptions and Round Complexity for Concurrent Zero-Knowledge in the Bare Public-Key Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COCOON ![In: Computing and Combinatorics, 15th Annual International Conference, COCOON 2009, Niagara Falls, NY, USA, July 13-15, 2009, Proceedings, pp. 127-137, 2009, Springer, 978-3-642-02881-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Bare Public-Key Model, Complexity Assumptions, Round Complexity, Zero-Knowledge Protocols, Concurrent Zero-Knowledge |
31 | William S. Cooper |
Some Inconsistencies and Misidentified Modeling Assumptions in Probabilistic Information Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. ![In: ACM Trans. Inf. Syst. 13(1), pp. 100-111, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
bibliographic searching, modeling, consistency, logic, document retrieval, independence, assumptions |
31 | Inmaculada Higueras |
On Simplifying Assumptions of Runge-Kutta Methods for Index 2 Differential Algebraic Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing ![In: Computing 54(2), pp. 185-190, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
Differential-algebraic systems, order conditions, simplifying assumptions, Runge-Kutta methods |
31 | Robert A. Wagner |
Finiteness assumptions and intellectual isolation of computer scientists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 13(12), pp. 759-760, 1970. The full citation details ...](Pics/full.jpeg) |
1970 |
DBLP DOI BibTeX RDF |
Algol vs. Fortran, finite word size, finiteness assumptions, integer variable range, intellectual isolation, memory finiteness |
31 | Pham Ngoc Hung, Toshiaki Aoki, Takuya Katayama |
A Minimized Assumption Generation Method for Component-Based Software Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAC ![In: Theoretical Aspects of Computing - ICTAC 2009, 6th International Colloquium, Kuala Lumpur, Malaysia, August 16-20, 2009. Proceedings, pp. 277-291, 2009, Springer, 978-3-642-03465-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
minimal assumption, model checking, learning algorithm, modular verification, assume-guarantee reasoning |
30 | Omkant Pandey, Rafael Pass, Vinod Vaikuntanathan |
Adaptive One-Way Functions and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 57-74, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cryptographic Assumptions, Non-malleable Commitment, Non-malleable Zero-knowledge |
28 | David Malone, Ian Dangerfield, Douglas J. Leith |
Verification of Common 802.11 MAC Model Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAM ![In: Passive and Active Network Measurement, 8th Internatinoal Conference, PAM 2007, Louvain-la-neuve, Belgium, April 5-6, 2007, Proceedings, pp. 63-72, 2007, Springer, 978-3-540-71616-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Achour Mostéfaoui, Michel Raynal, Corentin Travers |
Time-Free and Timer-Based Assumptions Can Be Combined to Obtain Eventual Leadership. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 17(7), pp. 656-666, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
time-free assumption, timer-based assumption, fault tolerance, distributed algorithm, Asynchronous system, leader election, process crash, hybrid protocol |
28 | Henning Christiansen 0001, Verónica Dahl |
HYPROLOG: A New Logic Programming Language with Assumptions and Abduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICLP ![In: Logic Programming, 21st International Conference, ICLP 2005, Sitges, Spain, October 2-5, 2005, Proceedings, pp. 159-173, 2005, Springer, 3-540-29208-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Boaz Barak, Ran Canetti, Jesper Buus Nielsen, Rafael Pass |
Universally Composable Protocols with Relaxed Set-Up Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 45th Symposium on Foundations of Computer Science (FOCS 2004), 17-19 October 2004, Rome, Italy, Proceedings, pp. 186-195, 2004, IEEE Computer Society, 0-7695-2228-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | David Kotz, Calvin C. Newport, Robert S. Gray, Jason Liu 0001, Yougu Yuan, Chip Elliott |
Experimental evaluation of wireless simulation assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSWiM ![In: Proceedings of the 7th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2004, Venice, Italy, October 4-6, 2004, pp. 78-82, 2004, ACM, 1-58113-953-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ad hoc network, mobile computing, wireless network, MANET, measurement, experiment, 802.11, network simulation, Wi-Fi |
28 | Ron Sun, Dehu Qi |
Rationality Assumptions and Optimality of Co-learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: Design and Applications of Intelligent Agents, Third Pacific Rim International Workshop on Multi-Agents, PRIMA 2000, Melbourne, Australia, August 28-29, 2000, Proceedings, pp. 61-75, 2000, Springer, 3-540-67911-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Tatsuaki Okamoto, Kazuo Ohta |
How to Simultaneously Exchange Secrets by General Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 184-192, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
28 | Tatsuaki Okamoto |
On the Relationship among Cryptographic Physical Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 4th International Symposium, ISAAC '93, Hong Kong, December 15-17, 1993, Proceedings, pp. 369-378, 1993, Springer, 3-540-57568-5. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
27 | Jürg Kohlas, Christian Eichenberger |
Uncertain Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Theories of Information ![In: Formal Theories of Information: From Shannon to Semantic Information Theory and General Concepts of Information [Muenchenwiler Seminar (Switzerland), May 2009], pp. 128-160, 2009, Springer, 978-3-642-00658-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Vera Hollink, Maarten van Someren, Bob J. Wielinga |
Navigation behavior models for link structure optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
User Model. User Adapt. Interact. ![In: User Model. User Adapt. Interact. 17(4), pp. 339-377, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Link structure optimization, Web site efficiency, Navigation menus, Model selection, User behavior models |
27 | Claudio de la Riva, Javier Tuya |
Modular Model Checking of Software Specifications with Simultaneous Environment Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATVA ![In: Automated Technology for Verification and Analysis: Second International Conference, ATVA 2004, Taipei, Taiwan, ROC, October 31-November 3, 2004. Proceedings, pp. 369-383, 2004, Springer, 3-540-23610-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Maria Calzarossa, Domenico Ferrari |
A Sensitivity Study of the Clustering Approach to Workload Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the 1985 ACM SIGMETRICS conference on Measurement and modeling of computer systems, Austin, Texas, USA, August 26-29, 1985, pp. 38-39, 1985, ACM, 0-89791-169-5. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
26 | Benoît Chevallier-Mames, Marc Joye |
Chosen-Ciphertext Secure RSA-Type Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 32-46, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RSA-based encryption schemes, instance-independence assumptions, one-time mappable chameleon hashing, standard model, public-key encryption, Chosen-ciphertext security |
26 | Georgios K. Giannikis, Aspassia Daskalopulu |
The role of assumption identification in autonomous agent reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS (2) ![In: 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 2, pp. 1135-1136, 2009, IFAAMAS, 978-0-9817381-7-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
agents, autonomy, default logic, assumptions |
26 | Antonio Fernández 0001, Ernesto Jiménez, Michel Raynal, Gilles Trédan |
A Timing Assumption and a t-Resilient Protocol for Implementing an Eventual Leader Service in Asynchronous Shared Memory Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISORC ![In: Tenth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2007), 7-9 May 2007, Santorini Island, Greece, pp. 71-78, 2007, IEEE Computer Society, 0-7695-2765-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Timer property, Timing assumptions, Fault-tolerance, Shared memory, System model, Asynchronous system, Process crash, Atomic register, Omega, Eventual leader |
26 | Hoeteck Wee |
Lower Bounds for Non-interactive Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings, pp. 103-117, 2007, Springer, 3-540-70935-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
set-up assumptions, lower bounds, Non-interactive zero-knowledge |
26 | Shuhua Wu, Yuefei Zhu |
Efficient Augmented Password-Based Encrypted Key Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings, pp. 533-542, 2006, Springer, 3-540-49932-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
encrypted key exchange, password, Diffie-Hellman assumptions |
26 | Ben C. Moszkowski |
Compositional reasoning about projected and infinite time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), November 6-10, 1995, Fort Lauderdale, Florida, USA, pp. 238-245, 1995, IEEE Computer Society, 0-8186-7123-8. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
multiple time granularities, parallel programming, concurrency, temporal logic, temporal logic, concurrency control, theorem proving, multiprocessing systems, deadlock, commitments, concurrent system, assumptions, Interval Temporal Logic |
26 | Scott A. Vander Wiel, Lawrence G. Votta |
Assessing Software Designs Using Capture-Recapture Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 19(11), pp. 1045-1054, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
capture-recapture methods, wildlife population estimation, broken assumptions, jackknife estimators, software quality, software reliability, statistical analysis, software designs, maximum likelihood estimators, maximum likelihood estimation, Monte Carlo simulation, software quality assurance, statistical estimation, design reviews |
25 | Mäjt Wik, Daniel Curto-Millet, Tomas Lindroth |
Modes of Engagement: Problematizing Managerial Assumptions of Participation in Public Sector Digital Transformation: Problematizing managerial assumptions of participation in public sector digital transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 24th Annual International Conference on Digital Government Research, DGO 2023, Gdańsk, Poland, July 11-14, 2023, pp. 309-317, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Steffen Zschaler, Awais Rashid |
Aspect assumptions: a retrospective study of AspectJ developers' assumptions about aspect usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AOSD ![In: Proceedings of the 10th International Conference on Aspect-Oriented Software Development, AOSD 2011, Porto de Galinhas, Brazil, March 21-25, 2011, pp. 93-104, 2011, ACM, 978-1-4503-0605-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Eric W. K. Tsang |
Commentary - Assumptions, Explanation, and Prediction in Marketing Science: "It's the Findings, Stupid, Not the Assumptions". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mark. Sci. ![In: Mark. Sci. 28(5), pp. 986-990, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Miklós Ajtai |
Oblivious RAMs without cryptogrpahic assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, Cambridge, Massachusetts, USA, 5-8 June 2010, pp. 181-190, 2010, ACM, 978-1-4503-0050-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
RAM, oblivious |
24 | Jelena Marincic, Angelika Mader, Roel J. Wieringa |
Classifying Assumptions Made during Requirements Verification of Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
REFSQ ![In: Requirements Engineering: Foundation for Software Quality, 14th International Working Conference, REFSQ 2008, Montpellier, France, June 16-17, 2008, Proceedings, pp. 141-146, 2008, Springer, 978-3-540-69060-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Jose Kooken, Tobias Ley, Robert de Hoog |
How Do People Learn at the Workplace? Investigating Four Workplace Learning Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-TEL ![In: Creating New Learning Experiences on a Global Scale, Second European Conference on Technology Enhanced Learning, EC-TEL 2007, Crete, Greece, September 17-20, 2007, Proceedings, pp. 158-171, 2007, Springer, 978-3-540-75194-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multi-method approach, learning bottlenecks, task driven learning, informal learning, workplace learning |
24 | Jack P. C. Kleijnen |
White noise assumptions revisited: regression metamodels and experimental designs in practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the Winter Simulation Conference WSC 2006, Monterey, California, USA, December 3-6, 2006, pp. 107-117, 2006, IEEE Computer Society, 1-4244-0501-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Vishal Suthar, Shantanu Dutt |
Mixed PLB and Interconnect BIST for FPGAs Without Fault-Free Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 24th IEEE VLSI Test Symposium (VTS 2006), 30 April - 4 May 2006, Berkeley, California, USA, pp. 36-43, 2006, IEEE Computer Society, 0-7695-2514-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Giovanni Di Crescenzo, Renwei Ge, Gonzalo R. Arce |
Improved topology assumptions for threshold cryptography in mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005, pp. 53-62, 2005, ACM, 1-59593-227-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
distributed cryptography, mobile ad hoc networks, threshold cryptography, threshold signatures |
24 | Patricia Lago, Hans van Vliet |
Explicit assumptions enrich architectural models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 27th International Conference on Software Engineering (ICSE 2005), 15-21 May 2005, St. Louis, Missouri, USA, pp. 206-214, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
software architecture, knowledge management, documentation, architecture model, assumption |
24 | Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh |
Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings, pp. 347-354, 2004, Springer, 3-540-21312-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Dimitra Giannakopoulou, Corina S. Pasareanu, Jamieson M. Cobleigh |
Assume-Guarantee Verification of Source Code with Design-Level Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 26th International Conference on Software Engineering (ICSE 2004), 23-28 May 2004, Edinburgh, United Kingdom, pp. 211-220, 2004, IEEE Computer Society, 0-7695-2163-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Jamieson M. Cobleigh, Dimitra Giannakopoulou, Corina S. Pasareanu |
Learning Assumptions for Compositional Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TACAS ![In: Tools and Algorithms for the Construction and Analysis of Systems, 9th International Conference, TACAS 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003, Proceedings, pp. 331-346, 2003, Springer, 3-540-00898-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Jordi Cortadella, Michael Kishinevsky, Steven M. Burns, Alex Kondratyev, Luciano Lavagno, Ken S. Stevens, Alexander Taubin, Alexandre Yakovlev |
Lazy transition systems and asynchronous circuit synthesis withrelative timing assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 21(2), pp. 109-130, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Andy Yan, Rebecca Cheng, Steven J. E. Wilton |
On the sensitivity of FPGA architectural conclusions to experimental assumptions, tools, and techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, FPGA 2002, Monterey, CA, USA, February 24-26, 2002, pp. 147-156, 2002, ACM, 1-58113-452-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Valentin Razmov, Daniel R. Simon |
Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 347-357, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Giovanni Di Crescenzo |
Removing Complexity Assumptions from Concurrent Zero-Knowledge Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COCOON ![In: Computing and Combinatorics, 6th Annual International Conference, COCOON 2000, Sydney, Australia, July 26-28, 2000, Proceedings, pp. 426-435, 2000, Springer, 3-540-67787-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Jordi Cortadella, Michael Kishinevsky, Steven M. Burns, Ken S. Stevens |
Synthesis of asynchronous control circuits with automatically generated relative timing assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: Proceedings of the 1999 IEEE/ACM International Conference on Computer-Aided Design, 1999, San Jose, California, USA, November 7-11, 1999, pp. 324-331, 1999, IEEE Computer Society, 0-7803-5832-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Thomas J. Froehlich |
User assumptions about information retrieval systems: ethical concerns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ethics in Computer Age ![In: Proceedings of the Conference on Ethics in Computer Age, Galtinburg, Tennessee, USA, November 11-13, 1994, pp. 146-150, 1994, ACM, 0-89791-644-1. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
23 | Daniel von Dincklage, Amer Diwan |
Optimizing programs with intended semantics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA ![In: Proceedings of the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2009, October 25-29, 2009, Orlando, Florida, USA, pp. 409-424, 2009, ACM, 978-1-60558-766-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
intended semantics, optimization |
23 | Kosheek Sewchurran, Elsje Scott |
Learning and making sense of project phenomena in information systems education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 1-8, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Bella Dubrov, Yuval Ishai |
On the randomness complexity of efficient sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 38th Annual ACM Symposium on Theory of Computing, Seattle, WA, USA, May 21-23, 2006, pp. 711-720, 2006, ACM, 1-59593-134-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
information theoretic cryptography, randomness complexity, compression, derandomization, pseudorandom generators, secure computation |
22 | Eli Gafni, Petr Kuznetsov |
The weakest failure detector for solving k-set agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, PODC 2009, Calgary, Alberta, Canada, August 10-12, 2009, pp. 83-91, 2009, ACM, 978-1-60558-396-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
BG-simulation, synchrony assumptions, weakest failure detector, failure detectors, k-set agreement |
22 | Ian F. Alexander |
10 Small Steps to Better Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 23(2), pp. 19-21, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
mission, requirements, scenarios, projects, priorities, conflicts, stakeholders, goals, scope, assumptions, justifications, acceptance criteria |
22 | J. Ramón Gil-García, Theresa A. Pardo |
Multiple methods and multiple paradigms for digital government research: understanding the promises and challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 2005 National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, USA, May 15-18, 2005, pp. 343, 2005, Digital Government Research Center. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
combination of methods, muti-method approaches, philosophical assumptions, research methods, mixed methods |
22 | Michel Abdalla, David Pointcheval |
Simple Password-Based Encrypted Key Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 191-208, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
encrypted key exchange, Password, Diffie-Hellman assumptions |
22 | Brian Randell |
On Failures and Faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FME ![In: FME 2003: Formal Methods, International Symposium of Formal Methods Europe, Pisa, Italy, September 8-14, 2003, Proceedings, pp. 18-39, 2003, Springer, 3-540-40828-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
fault assumptions, Dependability, formal concepts |
22 | Matthias Nicola, Matthias Jarke |
Performance Modeling of Distributed and Replicated Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 12(4), pp. 645-672, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
interdatabase communication, modeling assumptions, measurements, benchmarks, distributed databases, replication, Performance models, queueing theory |
22 | Ronan Gaugne |
A Static Analysis for Program Understanding and Debugging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 1997 International Conference on Automated Software Engineering, ASE 1997, Lake Tahoe, CA, USA, November 2-5, 1997, pp. 297-298, 1997, IEEE Computer Society, 0-8186-7961-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
static pointer analysis technique, C subset, user-defined assertions, static assertions, hypothetical assertions, circular structures, reverse engineering, program understanding, program debugging, automatic verification, assumptions, recursive data structures |
22 | Axel van Lamsweerde, Robert Darimont, Philippe Massonet |
Goal-directed elaboration of requirements for a meeting scheduler: problems and lessons learnt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: Second IEEE International Symposium on Requirements Engineering, March 27 - 29, 1995, York, England, UK, pp. 194-203, 1995, IEEE Computer Society, 0-8186-7017-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
goal-directed elaboration, requirements engineering languages, nontrivial benchmark, complex requirements engineering tasks, distributed meeting scheduler system, KAOS goal directed language, goal identification, deidelization, interfering goals, abstract descriptions, retractable assumptions, hybrid acquisition strategies, scheduling, formal specification, groupware, case study, specification languages, requirements traceability, formal reasoning, meeting scheduler |
22 | Fabio Grandi 0001, Maria Rita Scalas |
Block Access Estimation for Clustered Data Using a Finite LRU Buffer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 19(7), pp. 641-660, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
block access estimation, data access cost evaluation, clustered data, finite LRU buffer, clustering effect, buffer memory, real systems, comprehensive cost model, clustered data retrieval, uniform data clustering assumptions, predictive power, query processing, database management systems, database systems, buffer storage, information retrieval systems, computational costs |
22 | Brigitte Plateau, Karim Atif |
Stochastic Automata Network For Modeling Parallel Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 17(10), pp. 1093-1108, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
parallel activities, synchronization points, modular state-transition representation, Markovian assumptions, tensor algebra operators, performance evaluation, parallel algorithms, parallel architectures, parallel system, SAN, decomposition technique, stochastic automata, stochastic automata network, state-space explosion, transition matrix, storage cost |
20 | Susan Hohenberger, Brent Waters |
Realizing Hash-and-Sign Signatures under Standard Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 333-350, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Kai-Yuen Cheong, Takeshi Koshiba |
Reducing Complexity Assumptions for Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings, pp. 110-124, 2009, Springer, 978-3-642-04845-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
trapdoor one-way functions, oblivious transfer |
20 | Brent Waters |
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 619-636, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | François Ingelrest, David Simplot-Ryl |
Maximizing the Delivery of MPR Broadcasting Under Realistic Physical Layer Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 23(3), pp. 451-460, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
multipoint relay broadcasting, realistic physical layer, sensor network, ad hoc network |
20 | Marcos Kawazoe Aguilera, Carole Delporte-Gallet, Hugues Fauconnier, Sam Toueg |
On implementing omega in systems with weak reliability and synchrony assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 21(4), pp. 285-314, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Wonhong Nam, P. Madhusudan, Rajeev Alur |
Automatic symbolic compositional verification by learning assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Methods Syst. Des. ![In: Formal Methods Syst. Des. 32(3), pp. 207-234, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Regular language learning, Formal verification, Symbolic model checking, Compositional verification, Assume-guarantee reasoning, Hypergraph partitioning |
20 | Andreas Podelski, Andrey Rybalchenko, Thomas Wies |
Heap Assumptions on Demand. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAV ![In: Computer Aided Verification, 20th International Conference, CAV 2008, Princeton, NJ, USA, July 7-14, 2008, Proceedings, pp. 314-327, 2008, Springer, 978-3-540-70543-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Oktay Türetken, Özden Özcan Top, Baris Özkan, Onur Demirörs |
The Impact of Individual Assumptions on Functional Size Measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSM/Metrikon/Mensura ![In: Software Process and Product Measurement, International Conferences: IWSM 2008, Metrikon 2008, and Mensura 2008, Munich, Germany, November 18-19, 2008. Proceedings, pp. 155-169, 2008, Springer, 978-3-540-89402-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
COSMIC FSM, IFPUG FPA, MkII FPA, Functional Size Measurement |
20 | Simon Tjell, João M. Fernandes |
Expressing Environment Assumptions and Real-time Requirements for a Distributed Embedded System with Shared Variables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIPES ![In: Distributed Embedded Systems: Design, Middleware and Resources, IFIP 20th World Computer Congress, TC10 Working Conference on Distributed and Parallel Embedded Systems (DIPES 2008), September 7-10, 2008, Milano, Italy, pp. 79-88, 2008, Springer, 978-0-387-09660-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Krishnendu Chatterjee, Thomas A. Henzinger, Barbara Jobstmann |
Environment Assumptions for Synthesis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONCUR ![In: CONCUR 2008 - Concurrency Theory, 19th International Conference, CONCUR 2008, Toronto, Canada, August 19-22, 2008. Proceedings, pp. 147-161, 2008, Springer, 978-3-540-85360-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Jeffrey S. Pierce, Randy Pausch |
Generating 3D interaction techniques by identifying and breaking assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Virtual Real. ![In: Virtual Real. 11(1), pp. 15-21, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Virtual reality, Interaction techniques, 3D interaction, Generative methods |
20 | Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. Rivers |
Architecture-Level Soft Error Analysis: Examining the Limits of Common Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings, pp. 266-275, 2007, IEEE Computer Society, 0-7695-2855-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Carmit Hazay, Jonathan Katz, Chiu-Yuen Koo, Yehuda Lindell |
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings, pp. 323-341, 2007, Springer, 3-540-70935-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Tal Malkin, Ryan Moriarty, Nikolai Yakovenko |
Generalized Environmental Security from Number Theoretic Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, pp. 343-359, 2006, Springer, 3-540-32731-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater |
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings, pp. 63-77, 2006, Springer, 3-540-38080-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Anil Bazaz, James D. Arthur, Joseph G. Tront |
Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC ![In: Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September - 1 October 2006, Indianapolis, Indiana, USA, pp. 95-102, 2006, IEEE Computer Society, 0-7695-2539-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Rajeev Alur, P. Madhusudan, Wonhong Nam |
Symbolic Compositional Verification by Learning Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAV ![In: Computer Aided Verification, 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings, pp. 548-562, 2005, Springer, 3-540-27231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Emanuela Busetti, Giuliana Dettori, Paola Forcheri, Maria Grazia Ierardi |
Devising a Typology of LOs Based on Pedagogical Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWL ![In: Advances in Web-Based Learning - ICWL 2005, 4th International Conference, Hong Kong, China, July 31 - August 3, 2005, Proceedings, pp. 375-386, 2005, Springer, 3-540-27895-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel |
Reducing Complexity Assumptions for Statistically-Hiding Commitment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 58-77, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Farn Wang |
Model-Checking Distributed Real-Time Systems with States, Events, and Multiple Fairness Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMAST ![In: Algebraic Methodology and Software Technology, 10th International Conference, AMAST 2004, Stirling, Scotland, UK, July 12-16, 2004, Proceedings, pp. 553-568, 2004, Springer, 3-540-22381-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
model-checking, verification, real-time, Distributed, fairness, events |
20 | Mihir Bellare, Adriana Palacio |
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, pp. 273-289, 2004, Springer, 3-540-22668-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 8030 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|