Sciweavers

4764 search results - page 643 / 953
» Applications of Error-Control Coding
Sort
View
149
Voted
ACMSE
2004
ACM
15 years 8 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
167
Voted
ACNS
2006
Springer
148views Cryptology» more  ACNS 2006»
15 years 8 months ago
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
A cover-free family is a well-studied combinatorial structure that has many applications in computer science and cryptography. In this paper, we propose a new public key traitor t...
Dongvu Tonien, Reihaneh Safavi-Naini
APSEC
2004
IEEE
15 years 8 months ago
Testing Java Interrupts and Timed Waits
Testing concurrent software is difficult due to problems with inherent non-determinism. In previous work, we have presented a method and tool support for the testing of concurrent...
Luke Wildman, Brad Long, Paul A. Strooper
ASAP
2006
IEEE
108views Hardware» more  ASAP 2006»
15 years 8 months ago
New Schemes in Clustered VLIW Processors Applied to Turbo Decoding
State-of-the-art communication standards make extensive use of Turbo codes. The complex and power consuming designs that currently implement the turbo decoder expose the need for ...
Pablo Ituero, Marisa López-Vallejo
EDOC
2004
IEEE
15 years 8 months ago
Write Once, Deploy N: A Performance Oriented MDA Case Study
To focus the comparison of languages for model checking and transformation on criteria that matter in practical development, there is an urgent need for more, and more realistic, ...
Pieter Van Gorp, Dirk Janssens, Tracy Gardner