Sciweavers

254 search results - page 40 / 51
» Binary amiable Words
Sort
View
85
Voted
ICISC
2008
103views Cryptology» more  ICISC 2008»
15 years 11 days ago
Instruction Set Limitation in Support of Software Diversity
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilience of software diversification against collusion attacks. Such attacks require a...
Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat,...
82
Voted
METMBS
2004
151views Mathematics» more  METMBS 2004»
15 years 9 days ago
Machine Learning Techniques for the Evaluation of External Skeletal Fixation Structures
In this thesis we compare several machine learning techniques for evaluating external skeletal fixation proposals. We experimented in the context of dog bone fractures but the pot...
Ning Suo, Khaled Rasheed, Walter D. Potter, Dennis...
87
Voted
PDPTA
2003
15 years 9 days ago
A Design for Node Coloring and 1-Fair Alternator on de Bruijn Networks
In this paper, we study the coloring problem for the undirected binary de Bruijn interconnection network. The coloring scheme is simple and fast. We propose the coloring algorithm...
Jyh-Wen Mao, Chang-Biau Yang
85
Voted
INTERACT
1997
15 years 8 days ago
Eigen-Space Coding as a Means to Support Privacy in Computer Mediated Communication
The current solutions to disclosing privacy in computer-mediated communication are two-fold: either the connection is permitted and an audio-video link is opened providing a full-b...
Joëlle Coutaz, James L. Crowley, Franç...
71
Voted
ENTCS
2006
112views more  ENTCS 2006»
14 years 11 months ago
Distributed Symbolic Bounded Property Checking
In this paper we describe an algorithm for distributed, BDD-based bounded property checking and its implementation in the verification tool SymC. The distributed algorithm verifie...
Pradeep Kumar Nalla, Roland J. Weiss, Prakash Moha...