Sciweavers

2797 search results - page 531 / 560
» Code query by example
Sort
View
NDSS
2008
IEEE
15 years 8 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
ICC
2007
IEEE
123views Communications» more  ICC 2007»
15 years 8 months ago
The Effect of Ordered Detection and Antenna Selection on Diversity Gain of Decision Feedback Detector
— The decision feedback detector (DFD) can achieve the high spectral efficiency of a MIMO channel in that it converts the MIMO channel into multiple parallel layers, through whi...
Yi Jiang, Mahesh K. Varanasi
VTC
2007
IEEE
183views Communications» more  VTC 2007»
15 years 8 months ago
Multimedia over 802.15.4 and ZigBee Networks for Ambient Environment Control
—WPAN technologies such as IEEE 802.15.4 have been introduced to allow for energy-efficient communication of control and sensor data. In certain application areas, it is benefici...
Ralf Burda, Christian Wietfeld
119
Voted
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
15 years 8 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
ICS
2007
Tsinghua U.
15 years 8 months ago
Sensitivity analysis for automatic parallelization on multi-cores
Sensitivity Analysis (SA) is a novel compiler technique that complements, and integrates with, static automatic parallelization analysis for the cases when relevant program behavi...
Silvius Rus, Maikel Pennings, Lawrence Rauchwerger