Type
Now showing items 120 of 26

Analysis of Trivium Using Compressed Right Hand Side Equations
(Springer Berlin Heidelberg, 2012)We study a new representation of nonlinear multivariate equations for algebraic cryptanalysis. Using a combination of multiple right hand side equations and binary decision diagrams, our new representation allows a ...Peer reviewedChapter 
Classifying and Measuring Student Problems and Misconceptions
(Akademika forlag, 2013)In this paper we report on an attempt to classify student problems and mistakes, and measuring the frequency of particular problems in a firstsemester programming course. We also propose a scheme for annotating student ...Chapter 

Comparison of Discrete and Continuous Models for the Pooling Problem
(Dagstuhl Publishing, 2011)The pooling problem is an important global optimization problem which is encountered in many industrial settings. It is traditionally modeled as a bilinear, nonconvex optimization problem, and solved by branchandbound ...ChapterPeer reviewed 
A Continuous MaxFlow Approach to Minimal Partitions with Label Cost Prior
(The authors, 2011)This paper investigates a convex relaxation approach for minimum description length (MDL) based image partitioning or labeling, which proposes an energy functional regularized by the spatial smoothness prior joint with ...ChapterPeer reviewed 
Differential Fault Analysis of Trivium
(Springer Berlin Heidelberg, 2008)Trivium is a hardwareoriented stream cipher designed in 2005 by de Canni`ere and Preneel for the European project eStream, and it has successfully passed the first and the second phase of this project. Its design has ...ChapterPeer reviewed 
Floating Fault Analysis of Trivium
(Springer Berlin Heidelberg, 2008)One of the eSTREAM final portfolio ciphers is the hardwareoriented stream cipher Trivium. It is based on 3 nonlinear feedback shift registers with a linear output function. Although Trivium has attached a lot of interest, ...ChapterPeer reviewed 
The Inclusion Problem for Regular Expressions
(Springer, 2010)This paper presents a new polynomialtime algorithm for the inclusion problem for certain pairs of regular expressions. The algorithm is not based on construction of finite automata, and can therefore be faster than the ...Peer reviewedChapter 
Inferring Required Permissions for Statically Composed Programs
(Springer, 2013)Permissionbased security models are common in smartphone operating systems. Such models implement access control for sensitive APIs, introducing an additional concern for application developers. It is important for the ...Chapter 
Integrated Multiaspect Visualization of 3D Fluid Flows
(The Eurographics Association, 2013)The motion of a fluid is affected by several intertwined flow aspects. Analyzing one aspect at a time can only yield partial information about the flow behavior. More details can be revealed by studying their interactions. ...Chapter 


Parsing in a Broad Sense
(Springer, 2014)Having multiple representations of the same instance is common in software language engineering: models can be visualised as graphs, edited as text, serialised as XML. When mappings between such representations are considered, ...Chapter 
Periodicity of otolith check formation in the juvenile plaice Pleuronectes platessa
(University of South Carolina Press, 1995)Juvenile (Pleuronectes platessa L.) were sampled in the intertidal zone of Port Erin Bay (Isle of Man, Irish Sea) by pushnet in the summers of 1990 and 1992. Check formation on the sagittal otoliths was examined to test ...Peer reviewedChapterConference object 
Phase Transition in a System of Random Sparse Boolean Equations
(Versita Open, 2012)Many problems, including algebraic cryptanalysis, can be transformed to a problem of solving a (large) system of sparse Boolean equations. In this article we study 2 algorithms that can be used to remove some redundancy ...Peer reviewedChapter 
A Pretty Good Formatting Pipeline
(Springer, 2013)Proper formatting makes the structure of a program apparent and aids program comprehension. The need to format code arises in code generation and transformation, as well as in normal reading and editing situations. ...Chapter 
Regular Expressions with Numerical Constraints and Automata with Counters
(Springer, 2009)Regular expressions with numerical constraints are an extension of regular expressions, allowing to bound numerically the number of times that a subexpression should be matched. Expressions in this extension describe the ...ChapterPeer reviewed 
Separating Exceptional Concerns
(IEEE, 2012)Traditional error handling mechanisms, including exceptions, have several weaknesses that interfere with maintainability, flexibility and genericity in software: Error code is tangled with normal code; reporting is ...Chapter 
Similaritybased Exploded Views
(Springer, 2008)Exploded views are often used in illustration to overcome the problem of occlusion when depicting complex structures. In this paper, we propose a volume visualization technique inspired by exploded views that partitions ...ChapterPeer reviewed 
Solving Compressed Right Hand Side Equation Systems with Linear Absorption
(Springer Berlin Heidelberg, 2012)In this paper we describe an approach for solving complex multivariate equation systems related to algebraic cryptanalysis. The work uses the newly introduced Compressed Right Hand Sides (CRHS) representation, where ...Peer reviewedChapter