Sciweavers

518 search results - page 26 / 104
» Abstract Interpretation-Based Protection
Sort
View
IH
2004
Springer
15 years 7 months ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn
TCAD
2008
75views more  TCAD 2008»
15 years 1 months ago
An Efficient Graph-Based Algorithm for ESD Current Path Analysis
Abstract--The electrostatic discharge (ESD) problem has become a challenging reliability issue in nanometer-circuit design. High voltages that resulted from ESD might cause high cu...
Chih-Hung Liu, Hung-Yi Liu, Chung-Wei Lin, Szu-Jui...
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
15 years 12 days ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
JSAC
2010
161views more  JSAC 2010»
14 years 8 months ago
Distortion optimal transmission of multi-layered FGS video over wireless channels
Abstract-- We identify an analytical expression for the distortion of a scalable video bitstream containing a Base Layer (BL) and one or more Enhancement Layer (EL) bitstreams. Con...
Negar Nejati, Homayoun Yousefi'zadeh, Hamid Jafark...
FMCO
2007
Springer
15 years 8 months ago
COSTA: Design and Implementation of a Cost and Termination Analyzer for Java Bytecode
This paper describes the architecture of costa, an abstract interpretation based cost and termination analyzer for Java bytecode. The system receives as input a bytecode program, (...
Elvira Albert, Puri Arenas, Samir Genaim, German P...