Sciweavers

8177 search results - page 232 / 1636
» Detecting System Emulators
Sort
View
CSFW
2007
IEEE
15 years 7 months ago
Compositional Security for Task-PIOAs
Task-PIOA is a modeling framework for distributed systems with both probabilistic and nondeterministic behaviors. It is suitable for cryptographic applications because its task-bas...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
142
Voted
IJCNN
2006
IEEE
15 years 6 months ago
Using Neural Network to Enhance Assimilating Sea Surface Height Data into an Ocean Model
—A generic approach that allows extracting functional nonlinear dependencies and mappings between atmospheric or ocean state variables in a relatively simple form is presented. T...
Vladimir M. Krasnopolsky, Carlos J. Lozano, Deanna...
VTC
2006
IEEE
152views Communications» more  VTC 2006»
15 years 6 months ago
Cross-Layer Interaction Between TCP and UMTS RRM Scheduling Strategies
— In the third generation wireless system UMTS, Radio Resource Management (RRM) functions should encompass scheduling algorithms. In particular, scheduling mechanisms play a key ...
Juan Rendón, Anna Sfairopoulou, Ramon Ferr&...
125
Voted
ACL2
2006
ACM
15 years 6 months ago
Parameterized congruences in ACL2
Support for congruence-based rewriting is built into ACL2. This capability allows ACL2 to treat certain predicate relations ”just like equality” under appropriate conditions a...
David Greve
78
Voted
IMC
2006
ACM
15 years 6 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...