Sciweavers

9316 search results - page 197 / 1864
» Analysis of traceback techniques
Sort
View
CSREASAM
2006
15 years 5 months ago
Security Analysis of the Digital Transmission Copy Protection Specification
- This paper analyzes the secure protocols in the digital transmission copy protection (DTCP) specification. The full authentication protocol in the specification is a combination ...
Haibo Tian, Yumin Wang
129
Voted
WSC
1997
15 years 5 months ago
On the Efficiency of the Splitting and Roulette Approach for Sensitivity Analysis
The paper is devoted to a brief review of a mathematical theory for the branching variance-reduction technique. The branching technique is an extension of von Neumann’s splittin...
Viatcheslav B. Melas
121
Voted
IJWET
2008
93views more  IJWET 2008»
15 years 4 months ago
Collective web usability analysis: cognitive and activity walkthroughs
: This paper reviews two walkthrough methods for the web design practitioner to assess their web-based systems. Their relative advantages and weaknesses, and suggestions for web ev...
Hokyoung Ryu
JSAC
2008
75views more  JSAC 2008»
15 years 4 months ago
Evolution analysis of low-cost iterative equalization in coded linear systems with cyclic prefixes
This paper is concerned with the low-cost iterative equalization/detection principles for coded linear systems with cyclic prefixes. Turbo frequency-domain-equalization (FDE) is ap...
Xiaojun Yuan, Qinghua Guo, Xiaodong Wang, Li Ping
SIGSOFT
1998
ACM
15 years 8 months ago
Effective Whole-Program Analysis in the Presence of Pointers
Understanding large software systems is difficult. Traditionally, automated tools are used to assist program understanding. However, the representations constructed by these tool...
Darren C. Atkinson, William G. Griswold