Sciweavers

3820 search results - page 243 / 764
» Bounded Model Debugging
Sort
View
180
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Analysis of the security of linear blinding techniques from an information theoretical point of view
We propose a novel model to characterize the security of linear blinding techniques. The proposed model relates the security of blinding to the possibility of estimating the blind...
Tiziano Bianchi, Alessandro Piva, Mauro Barni
160
Voted
PE
2010
Springer
212views Optimization» more  PE 2010»
14 years 10 months ago
Modeling TCP throughput: An elaborated large-deviations-based model and its empirical validation
In today's Internet, a large part of the traffic is carried using the TCP transport protocol. Characterization of the variations of TCP traffic is thus a major challenge, bot...
Patrick Loiseau, Paulo Gonçalves, Julien Ba...
130
Voted
SPAA
1995
ACM
15 years 7 months ago
Parallel Sorting with Limited Bandwidth
We study the problem of sorting on a parallel computer with limited communication bandwidth. By using the PRAM(m) model, where p processors communicate through a globally shared me...
Micah Adler, John W. Byers, Richard M. Karp
155
Voted
ISTCS
1992
Springer
15 years 7 months ago
Concurrent Timestamping Made Simple
Concurrent Time-stamp Systems (ctss) allow processes to temporally order concurrent events in an asynchronous shared memorysystem, a powerful tool for concurrency control, serving...
Rainer Gawlick, Nancy A. Lynch, Nir Shavit
137
Voted
SIAMDM
2008
79views more  SIAMDM 2008»
15 years 3 months ago
Testing Triangle-Freeness in General Graphs
In this paper we consider the problem of testing whether a graph is triangle-free, and more generally, whether it is H-free, for a fixed subgraph H. The algorithm should accept gr...
Noga Alon, Tali Kaufman, Michael Krivelevich, Dana...