Sciweavers

2561 search results - page 412 / 513
» Enhanced Quicksort Algorithm
Sort
View
106
Voted
TRUST
2010
Springer
15 years 7 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
137
Voted
APSEC
2002
IEEE
15 years 7 months ago
Quality Driven Transformation Compositions for Object Oriented Migration
Reengineering legacy software systems to object oriented platforms has received significant attention over the past few years. In this paper, we propose a goal driven software mig...
Ying Zou, Kostas Kontogiannis
120
Voted
CW
2002
IEEE
15 years 7 months ago
Mesh Median Filter for Smoothing 3-D Polygonal Surfaces
In this paper, we introduce a new mesh filtering method: a mesh median filter. This is an application of the median filter to smoothen 3-D noisy shapes given by triangle meshes...
Hirokazu Yagou, Alexander G. Belyaev, D. Weiz
108
Voted
INFOCOM
2002
IEEE
15 years 7 months ago
FPAC: Fast, Fixed-Cost Authentication for Access to Reserved Resources
—Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services ar...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
INFOCOM
2002
IEEE
15 years 7 months ago
Improving the Performance of Interactive TCP Applications using Service Differentiation
Abstract—Interactive TCP applications, such as Telnet and the Web, are particularly sensitive to network congestion. Indeed, congestion-induced queuing and packet loss can be a s...
Waël Noureddine, Fouad A. Tobagi