Sciweavers

1855 search results - page 148 / 371
» A coding theorem for distributed computation
Sort
View
116
Voted
ICPP
1993
IEEE
15 years 7 months ago
Automatic Parallelization Techniques for the EM-4
: This paper presents a Data-Distributed Execution approach that exploits interation-level parallelism in loops operating over arrays. It performs data-dependency analysis, based o...
Lubomir Bic, Mayez A. Al-Mouhamed
158
Voted
ASIACRYPT
2011
Springer
14 years 3 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
143
Voted
SIGSOFT
2004
ACM
16 years 4 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek
162
Voted
MM
2005
ACM
250views Multimedia» more  MM 2005»
15 years 9 months ago
An object-based video coding framework for video sequences obtained from static cameras
This paper presents a novel object-based video coding framework for videos obtained from a static camera. As opposed to most existing methods, the proposed method does not require...
Asaad Hakeem, Khurram Shafique, Mubarak Shah
TIT
2008
83views more  TIT 2008»
15 years 3 months ago
Constrained Codes as Networks of Relations
We address the well-known problem of determining the capacity of constrained coding systems. While the onedimensional case is well understood to the extent that there are technique...
Moshe Schwartz, Jehoshua Bruck