Sciweavers

2539 search results - page 383 / 508
» Debugging Method Names
Sort
View
CSFW
2010
IEEE
15 years 2 months ago
Impossibility Results for Secret Establishment
—Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we exami...
Benedikt Schmidt, Patrick Schaller, David A. Basin
FC
2010
Springer
160views Cryptology» more  FC 2010»
15 years 2 months ago
Measuring the Perpetrators and Funders of Typosquatting
We describe a method for identifying “typosquatting”, the intentional registration of misspellings of popular website addresses. We estimate that at least 938 000 typosquatting...
Tyler Moore, Benjamin Edelman
HPCC
2007
Springer
15 years 2 months ago
Concurrent Number Cruncher: An Efficient Sparse Linear Solver on the GPU
A wide class of geometry processing and PDE resolution methods needs to solve a linear system, where the non-zero pattern of the matrix is dictated by the connectivity matrix of th...
Luc Buatois, Guillaume Caumon, Bruno Lévy
71
Voted
GLOBECOM
2009
IEEE
15 years 2 months ago
Subcarrier-Pair Based Resource Allocation for Cooperative AF Multi-Relay OFDM Systems
We study the joint allocation of three types of resources, namely, power, subcarriers and relay nodes, in cooperative two-hop multi-relay OFDM systems. Each relay adopts the amplif...
Wenbing Dang, Meixia Tao, Hua Mu, Jianwei Huang
AMAST
2006
Springer
15 years 1 months ago
State Space Reduction of Rewrite Theories Using Invisible Transitions
Abstract. State space explosion is the hardest challenge to the effective application of model checking methods. We present a new technique for achieving drastic state space reduct...
Azadeh Farzan, José Meseguer