Sciweavers

1369 search results - page 149 / 274
» A Practical Implementation of the Timing Attack
Sort
View
OOPSLA
2001
Springer
15 years 3 months ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder
ICC
2007
IEEE
15 years 5 months ago
Computing Maximum-Likelihood Bounds for Reed-Solomon Codes over Partial Response Channels
Abstract—Computing maximum-likelihood bounds on the performance of systems involving partial response (PR) channels, with or without an error correcting code present, is rather c...
Richard M. Todd, J. R. Cruz
ICC
2007
IEEE
163views Communications» more  ICC 2007»
15 years 5 months ago
An Auction based AODV Protocol for Mobile Ad Hoc Networks with Selfish Nodes
– In this paper, we propose an auction mechanism for routing in mobile ad hoc networks with selfish nodes. Our approach is to promote bidding for end-to-end routes, as opposed to...
Cenker Demir, Cristina Comaniciu
ESOP
2007
Springer
15 years 5 months ago
Interprocedurally Analysing Linear Inequality Relations
In this paper we present an alternative approach to interprocedurally g linear inequality relations. We propose an abstraction of the effects of procedures through convex sets of t...
Helmut Seidl, Andrea Flexeder, Michael Petter
CC
2003
Springer
126views System Software» more  CC 2003»
15 years 4 months ago
Offset Assignment Showdown: Evaluation of DSP Address Code Optimization Algorithms
Abstract. Offset assignment is a highly effective DSP address code optimization technique that has been implemented in a number of ANSI C compilers. In this paper we concentrate on...
Rainer Leupers