Sciweavers

254 search results - page 40 / 51
» Binary amiable Words
Sort
View
100
Voted
ICISC
2008
103views Cryptology» more  ICISC 2008»
15 years 2 months ago
Instruction Set Limitation in Support of Software Diversity
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilience of software diversification against collusion attacks. Such attacks require a...
Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat,...
METMBS
2004
151views Mathematics» more  METMBS 2004»
15 years 2 months ago
Machine Learning Techniques for the Evaluation of External Skeletal Fixation Structures
In this thesis we compare several machine learning techniques for evaluating external skeletal fixation proposals. We experimented in the context of dog bone fractures but the pot...
Ning Suo, Khaled Rasheed, Walter D. Potter, Dennis...
104
Voted
PDPTA
2003
15 years 2 months ago
A Design for Node Coloring and 1-Fair Alternator on de Bruijn Networks
In this paper, we study the coloring problem for the undirected binary de Bruijn interconnection network. The coloring scheme is simple and fast. We propose the coloring algorithm...
Jyh-Wen Mao, Chang-Biau Yang
INTERACT
1997
15 years 2 months ago
Eigen-Space Coding as a Means to Support Privacy in Computer Mediated Communication
The current solutions to disclosing privacy in computer-mediated communication are two-fold: either the connection is permitted and an audio-video link is opened providing a full-b...
Joëlle Coutaz, James L. Crowley, Franç...
ENTCS
2006
112views more  ENTCS 2006»
15 years 22 days ago
Distributed Symbolic Bounded Property Checking
In this paper we describe an algorithm for distributed, BDD-based bounded property checking and its implementation in the verification tool SymC. The distributed algorithm verifie...
Pradeep Kumar Nalla, Roland J. Weiss, Prakash Moha...