Sciweavers

9842 search results - page 352 / 1969
» Compositional timing analysis
Sort
View
139
Voted
CRYPTO
2006
Springer
92views Cryptology» more  CRYPTO 2006»
15 years 8 months ago
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f : {0, 1, . . . , N - 1} {0, 1, . . . , N - 1}. The model...
Elad Barkan, Eli Biham, Adi Shamir
ACSW
2007
15 years 6 months ago
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model t...
Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Sa...
IVC
2000
179views more  IVC 2000»
15 years 4 months ago
A system to place observers on a polyhedral terrain in polynomial time
The Art Gallery Problem deals with determining the number of observers necessary to cover an art gallery room such that every point is seen by at least one observer. This problem ...
Maurício Marengoni, Bruce A. Draper, Allen ...
TPDS
2010
143views more  TPDS 2010»
15 years 3 months ago
FIT: A Flexible, Lightweight, and Real-Time Scheduling System for Wireless Sensor Platforms
—We propose FIT, a flexible, lightweight, and real-time scheduling system for wireless sensor platforms. There are three salient features of FIT. First, its two-tier hierarchical...
Wei Dong, Chun Chen, Xue Liu, Kougen Zheng, Rui Ch...
GIS
2009
ACM
15 years 11 months ago
Towards a probabilistic time geography
Time geography uses space-time volumes to represent the possible locations of a mobile agent over time in a x-y-t space. Space-time volumes are qualitative statements, enabling qu...
Stephan Winter