Blar i Department of Informatics på tittel
Viser treff 295-314 av 1199
-
Development of a System for Analysing Method Names in Java Source Code
(Master thesis, 2022-06-01)Naming code can seem like a simple task, however finding a good name can be rather challenging. Entity names should be consistent and brief yet comprehensive when representing the information each entity hold. What is ... -
Development of a system for example-driven software language engineering
(Master thesis, 2022-06-01) -
Development of Tools for Analyzing and Sharing Proteomics Data
(Doctoral thesis, 2010-03-22) -
Development of two-photon polymerised scaffolds for optical interrogation and neurite guidance of human iPSC-derived cortical neuronal networks
(Journal article; Peer reviewed, 2020)Recent progress in the field of human induced pluripotent stem cells (iPSCs) has led to the efficient production of human neuronal cell models for in vitro study. This has the potential to enable the understanding of live ... -
Diagram Predicate Framework meets Model Versioning and Deep Metamodelling
(Doctoral thesis, 2011-12-07)Model-driven engineering (MDE) is a branch of software engineering which aims at improving the productivity, quality and cost-effectiveness of software by shifting the paradigm from code-centric to model-centric. MDE ... -
Diagram predicate framework: A formal approach to MDE
(Doctoral thesis, 2010-11-29)Model-driven engineering (MDE) is a software engineering discipline which promotes models as first-class entities. It represents a shift of paradigm in software development, from being code-centric to become model-centric. ... -
A Diagrammatic Logic for Object-Oriented Visual Modeling
(Peer reviewed; Journal article, 2008-11-21)Formal generalized sketches is a graph-based specification format that borrows its main ideas from categorical and ordinary first-order logic, and adapts them to software engineering needs. In the engineering jargon, it ... -
Differential Fault Analysis of Trivium
(Lecture Notes in Computer Science; 5086, Chapter; Peer reviewed, 2008)Trivium is a hardware-oriented stream cipher designed in 2005 by de Canni`ere and Preneel for the European project eStream, and it has successfully passed the first and the second phase of this project. Its design has a ... -
Differential Power Analysis of the SKINNY Family of Block Ciphers
(Master thesis, 2020-12-16)The SKINNY family of lightweight block ciphers is well-researched in terms of standard cryptanalysis, but little has been done in the field of power analysis attacks. By sequentially dividing and conquering, univariate ... -
The differential spectrum of a ternary power mapping
(Journal article; Peer reviewed, 2020)A function f(x)from the finite field GF(pn)to itself is said to be differentially δ-uniform when the maximum number of solutions x ∈GF(pn)of f(x +a) −f(x) =bfor any a ∈GF(pn)∗and b ∈GF(pn)is equal to δ. Let p =3and d =3n−3. ... -
The Differential Spectrum of the Power Mapping xpn−3
(Journal article; Peer reviewed, 2022)Let n be a positive integer and p a prime. The power mapping xpn−3 over Fpn has desirable differential properties, and its differential spectra for p=2,3 have been determined. In this paper, for any odd prime p , by ... -
Differentially low uniform permutations from known 4-uniform functions
(Journal article; Peer reviewed, 2021)Functions with low differential uniformity can be used in a block cipher as S-boxes since they have good resistance to differential attacks. In this paper we consider piecewise constructions for permutations with low ... -
Differentiating between malicious events and natural events in an Operational Technology (OT) environment
(Master thesis, 2024-06-03) -
DimLift: Interactive Hierarchical Data Exploration through Dimensional Bundling
(Journal article; Peer reviewed, 2021)The identification of interesting patterns and relationships is essential to exploratory data analysis. This becomes increasingly difficult in high dimensional datasets. While dimensionality reduction techniques can be ... -
A direct construction of even length ZCPs with large ZCZ ratio
(Journal article; Peer reviewed, 2022)This paper presents a direct construction of aperiodic q-ary (q is a positive even integer) even length Z-complementary pairs (ZCPs) with large zero-correlation zone (ZCZ) width using generalised Boolean functions (GBFs). ... -
Direct Construction of Optimal Z-Complementary Code Sets With Even Lengths by Using Generalized Boolean Functions
(Journal article; Peer reviewed, 2022)The Z-complementary code set (ZCCS) is well-known for being used in multicarrier code-division multiple access (MC-CDMA) systems to provide interference-free communication in a quasi-synchronous environment. Based on the ... -
Direct data transfer between SOAP web services in Orchestration
(Chapter; Peer reviewed, 2012)In scientific data analysis, workflows are used to integrate and coordinate resources such as databases and tools. Workflows are normally executed by an orchestrator that invokes component services and mediates data transport ... -
The directed 2-linkage problem with length constraints
(Journal article; Peer reviewed, 2020) -
Directed graph representation of half-rate additive codes over GF(4)
(Peer reviewed; Journal article, 2010)We show that (n, 2n) additive codes over GF(4) can be represented as directed graphs. This generalizes earlier results on self-dual additive codes over GF(4), which correspond to undirected graphs. Graph representation ... -
Discrete event simulation in Java with applications in rodent navigation
(Master thesis, 2002)