Sciweavers

1369 search results - page 176 / 274
» A Practical Implementation of the Timing Attack
Sort
View
CPHYSICS
2004
93views more  CPHYSICS 2004»
14 years 11 months ago
Kinetic and dynamic Delaunay tetrahedralizations in three dimensions
We describe algorithms to implement fully dynamic and kinetic three-dimensional unconstrained Delaunay triangulations, where the time evolution of the triangulation is not only go...
Gernot Schaller, Michael Meyer-Hermann
DCC
2010
IEEE
14 years 9 months ago
Neural Markovian Predictive Compression: An Algorithm for Online Lossless Data Compression
This work proposes a novel practical and general-purpose lossless compression algorithm named Neural Markovian Predictive Compression (NMPC), based on a novel combination of Bayesi...
Erez Shermer, Mireille Avigal, Dana Shapira
JSAC
2008
95views more  JSAC 2008»
14 years 9 months ago
Cognitive Medium Access: Constraining Interference Based on Experimental Models
In this paper we design a cognitive radio that can coexist with multiple parallel WLAN channels while abiding by an interference constraint. The interaction between both systems is...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
RAID
2010
Springer
14 years 9 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
WDAG
2010
Springer
158views Algorithms» more  WDAG 2010»
14 years 9 months ago
Distributed Contention Resolution in Wireless Networks
We present and analyze simple distributed contention resolution protocols for wireless networks. In our setting, one is given n pairs of senders and receivers located in a metric ...
Thomas Kesselheim, Berthold Vöcking