Sciweavers

170 search results - page 21 / 34
» Constructing Small-Bias Sets from Algebraic-Geometric Codes
Sort
View
TACAS
2010
Springer
221views Algorithms» more  TACAS 2010»
15 years 6 months ago
Trace-Based Symbolic Analysis for Atomicity Violations
Abstract. We propose a symbolic algorithm to accurately predict atomicity violations by analyzing a concrete execution trace of a concurrent program. We use both the execution trac...
Chao Wang, Rhishikesh Limaye, Malay K. Ganai, Aart...
ICSM
1997
IEEE
15 years 3 months ago
Identifying modules via concept analysis
ÐWe describe a general technique for identifying modules in legacy code. The method is based on concept analysisÐa branch of lattice theory that can be used to identify similarit...
Michael Siff, Thomas W. Reps
PERCOM
2011
ACM
14 years 3 months ago
Mobile node rostering in intermittently connected passive RFID networks
— This paper focuses on the problem of rostering in intermittently connected passive RFID networks. It aims to report a list of tagged mobile nodes that appear in given intereste...
Zhipeng Yang, Hongyi Wu
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
15 years 5 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
CG
2007
Springer
14 years 11 months ago
Visual data mining and analysis of software repositories
In this article we describe an ongoing effort to integrate information visualization techniques into the process of configuration management for software systems. Our focus is to...
Lucian Voinea, Alexandru Telea