Sciweavers

1369 search results - page 186 / 274
» A Practical Implementation of the Timing Attack
Sort
View
80
Voted
INFOCOM
2009
IEEE
15 years 5 months ago
Extreme Value FEC for Wireless Data Broadcasting
Abstract—The advent of practical rateless codes enables implementation of highly efficient packet-level forward error correction (FEC) strategies for reliable data broadcasting ...
Weiyao Xiao, David Starobinski
JSAC
2010
142views more  JSAC 2010»
14 years 9 months ago
Extreme value FEC for reliable broadcasting in wireless networks
—The advent of practical rateless codes enables implementation of highly efficient packet-level forward error correction (FEC) strategies for reliable data broadcasting in loss-...
Weiyao Xiao, David Starobinski
CCS
2008
ACM
15 years 1 months ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton
SODA
1993
ACM
202views Algorithms» more  SODA 1993»
15 years 12 days ago
Approximate Nearest Neighbor Queries in Fixed Dimensions
Given a set of n points in d-dimensional Euclidean space, S ⊂ Ed , and a query point q ∈ Ed , we wish to determine the nearest neighbor of q, that is, the point of S whose Euc...
Sunil Arya, David M. Mount
DATE
2009
IEEE
163views Hardware» more  DATE 2009»
15 years 5 months ago
Fixed points for multi-cycle path detection
—Accurate timing analysis is crucial for obtaining the optimal clock frequency, and for other design stages such as power analysis. Most methods for estimating propagation delay ...
Vijay D'Silva, Daniel Kroening