Sciweavers

17129 search results - page 3307 / 3426
» Applied Computing
Sort
View
128
Voted
ACISP
2008
Springer
15 years 9 months ago
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
The elastic block cipher design employs the round function of a given, b-bit block cipher in a black box fashion, embedding it in a network structure to construct a family of ciphe...
Debra L. Cook, Moti Yung, Angelos D. Keromytis
137
Voted
ACSAC
2007
IEEE
15 years 9 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
ICC
2007
IEEE
120views Communications» more  ICC 2007»
15 years 9 months ago
Narrowband Interference Mitigation in Turbo-Coded OFDM Systems
— A method for the mitigation of the effect of narrowband interference (NBI) on the turbo decoder in OFDM systems is proposed. The presence of NBI leads to a contaminated Gaussia...
Sheetal Kalyani, Vimal Raj, Krishnamurthy Giridhar
129
Voted
ICC
2007
IEEE
165views Communications» more  ICC 2007»
15 years 9 months ago
Throughput and Delay Analysis of Multihop IEEE 802.11 Networks with Capture
In this paper, we present an analytical model for the approximate calculation of the throughput and end-toend delay performance in single hop and multihop IEEE 802.11 networks unde...
Rima Khalaf, Izhak Rubin, Ju-Lan Hsu
122
Voted
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 9 months ago
A Two-Layer Characteristic-based Rate Control Framework for Low Delay Video Transmission
— In this paper, we present a two-layer rate control In [4], their rate controller TMN8 applied the Lagrange framework for low delay video transmission based on a multiplier to d...
Chun-Yuan Chang, Ming-Hung Chen, Cheng-Fu Chou, Di...
« Prev « First page 3307 / 3426 Last » Next »