Sciweavers

55 search results - page 8 / 11
» Coded Asynchronous CDMA and Its Efficient Detection
Sort
View
FDTC
2006
Springer
80views Cryptology» more  FDTC 2006»
15 years 1 months ago
Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography
We present a new approach to fault tolerant public key cryptography based on redundant arithmetic in finite rings. Redundancy is achieved by embedding non-redundant field or ring ...
Gunnar Gaubatz, Berk Sunar
ICFP
2001
ACM
15 years 9 months ago
Down with Emacs Lisp: Dynamic Scope Analysis
It is possible to translate code written in Emacs Lisp or another Lisp dialect which uses dynamic scoping to a more modern programming language with lexical scoping while largely ...
Matthias Neubauer, Michael Sperber
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
15 years 10 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
PLDI
2009
ACM
15 years 10 months ago
Efficiently and precisely locating memory leaks and bloat
Inefficient use of memory, including leaks and bloat, remain a significant challenge for C and C++ developers. Applications with these problems become slower over time as their wo...
Gene Novark, Emery D. Berger, Benjamin G. Zorn
ESORICS
2010
Springer
14 years 10 months ago
Web Browser History Detection as a Real-World Privacy Threat
Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with br...
Artur Janc, Lukasz Olejnik