Matching Data Representation to Application Needs Case Study: Cryptographic Systems

被引:0
|
作者
Stouraitis, Thanos [1 ]
机构
[1] Univ Patras, Patras, Greece
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页码:XIV / XIV
页数:1
相关论文
共 50 条
  • [41] Video content representation, indexing, and matching in video information systems
    Chang, CW
    Lee, SY
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 1997, 8 (02) : 107 - 120
  • [42] Knowledge Representation and Data Fusion for archaeology : The case study of the castle of shawbak
    Seinturier, Julien
    Drap, Pierre
    Papini, Odile
    Vannini, Guido
    Nuccioti, Michele
    9TH INTERNATIONAL CONFERENCE ON COMPUTER GRAPHICS AND ARTIFICIAL INTELLIGENCE, 2006, : 169 - 179
  • [43] Towards policies for data insertion in dynamic data driven application systems: a case study sudden changes in wildland fire
    Rodriguez, Roque
    Cortes, Ana
    Margalef, Tomas
    ICCS 2010 - INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, PROCEEDINGS, 2010, 1 (01): : 1261 - 1270
  • [44] The efficacy of matching information systems development methodologies with application characteristics - an empirical study
    Howard, GS
    Bodnovich, T
    Janicki, T
    Liegle, J
    Klein, S
    Albert, P
    Cannon, D
    JOURNAL OF SYSTEMS AND SOFTWARE, 1999, 45 (03) : 177 - 195
  • [45] Cryptographic signals: Requirements, methods of synthesis, properties, application in telecommunication systems
    Gorbenko I.D.
    Zamula A.A.
    Gorbenko, I.D. (gorbenkoi@iit.kharkov.ua), 1600, Begell House Inc. (76): : 1079 - 1100
  • [46] Cryptographic Randomness on a CC2538: a Case Study
    Yan, Yan
    Oswald, Elisabeth
    Tryfonas, Theo
    2016 8TH IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS 2016), 2016,
  • [47] Using SMV for cryptographic protocol analysis: A case study
    Zhang, YQ
    Wang, CL
    Wei, SM
    FCS '05: Proceedings of the 2005 International Conference on Foundations of Computer Science, 2005, : 150 - 153
  • [48] Using SMV for cryptographic protocol analysis: A case study
    Zhang, Yuqing
    Wang, Chunling
    Wu, Jianping
    Li, Xing
    Operating Systems Review (ACM), 2001, 35 (02): : 43 - 50
  • [49] Representation of Performance Data in Grid Systems
    时培植
    李三立
    TsinghuaScienceandTechnology, 2004, (04) : 410 - 415
  • [50] Automatic detection of attacks on cryptographic protocols: A case study
    Cibrario, I
    Durante, L
    Sisto, R
    Valenzano, A
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 69 - 84