Sciweavers

1497 search results - page 233 / 300
» Extended static checking
Sort
View
104
Voted
TCS
2011
14 years 7 months ago
Optimizing n-variate (n+k)-nomials for small k
We give a high precision polynomial-time approximation scheme for the supremum of any honest n-variate (n + 2)-nomial with a constant term, allowing real exponents as well as real...
Philippe P. Pébay, J. Maurice Rojas, David ...
117
Voted
TCOM
2010
98views more  TCOM 2010»
14 years 7 months ago
Large-Girth Nonbinary QC-LDPC Codes of Various Lengths
In this paper, we construct nonbinary quasi-cyclic low-density parity-check (QC-LDPC) codes whose parity check matrices consist of an array of square sub-matrices which are either ...
Jie Huang, Lei Liu, Wuyang Zhou, Shengli Zhou
ASPLOS
2011
ACM
14 years 4 months ago
Ensuring operating system kernel integrity with OSck
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 4 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
212
Voted
BPM
2011
Springer
295views Business» more  BPM 2011»
14 years 21 days ago
Compliance by Design for Artifact-Centric Business Processes
Compliance to legal regulations, internal policies, or best practices is becoming a more and more important aspect in business processes management. Compliance requirements are usu...
Niels Lohmann