Sciweavers

17298 search results - page 3189 / 3460
» Abstract computing machines
Sort
View
VTC
2010
IEEE
124views Communications» more  VTC 2010»
15 years 2 months ago
A Novel Sampling Method for the Spatial Frequencies of Sinusoid-Based Shadowing Models
Abstract—Careful modeling of the radio channel characteristics is an important issue for system level simulations. While a number of detailed path loss, shadowing and fast fading...
Siegfried Klein, Serkan Uygungelen, Christian M. M...
WDAG
2010
Springer
233views Algorithms» more  WDAG 2010»
15 years 2 months ago
Minimum Dominating Set Approximation in Graphs of Bounded Arboricity
Abstract. Since in general it is NP-hard to solve the minimum dominating set problem even approximatively, a lot of work has been dedicated to central and distributed approximation...
Christoph Lenzen, Roger Wattenhofer
CC
2010
Springer
118views System Software» more  CC 2010»
15 years 2 months ago
Unrestricted Code Motion: A Program Representation and Transformation Algorithms Based on Future Values
Abstract. We introduce the concept of future values. Using future values it is possible to represent programs in a new control-flow form such that on any control flow path the data...
Shuhan Ding, Soner Önder
154
Voted
ACSAC
2010
IEEE
15 years 2 months ago
Analyzing and improving Linux kernel memory protection: a model checking approach
Code injection continues to pose a serious threat to computer systems. Among existing solutions, W X is a notable approach to prevent the execution of injected code. In this paper...
Siarhei Liakh, Michael C. Grace, Xuxian Jiang
ASIACRYPT
2010
Springer
15 years 2 months ago
Rotational Rebound Attacks on Reduced Skein
Abstract. In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competitio...
Dmitry Khovratovich, Ivica Nikolic, Christian Rech...
« Prev « First page 3189 / 3460 Last » Next »