Sciweavers

37 search results - page 7 / 8
» Fast Recursive Coding Based on Grouping of Symbols
Sort
View
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
DCC
2002
IEEE
15 years 9 months ago
Optimized Edgebreaker Encoding for Large and Regular Triangle Meshes
We present a technique designed aiming to improve the compression of the Edgebreaker CLERS string for large and regular meshes, where regularity is understood as the compactness o...
Andrzej Szymczak
90
Voted
SAFECOMP
2005
Springer
15 years 3 months ago
Are High-Level Languages Suitable for Robust Telecoms Software?
In the telecommunications sector product development must minimise time to market while delivering high levels of dependability, availability, maintainability and scalability. High...
Jan Henry Nyström, Philip W. Trinder, David J...
BC
2007
107views more  BC 2007»
14 years 9 months ago
Decoding spike train ensembles: tracking a moving stimulus
We consider the issue of how to read out the information from nonstationary spike train ensembles. Based on the theory of censored data in statistics, we propose a ‘censored’ m...
Enrico Rossoni, Jianfeng Feng
INFSOF
2010
173views more  INFSOF 2010»
14 years 6 months ago
Filtering false alarms of buffer overflow analysis using SMT solvers
Buffer overflow detection using static analysis can provide a powerful tool for software ers to find difficult bugs in C programs. Sound static analysis based on abstract interpre...
Youil Kim, Jooyong Lee, Hwansoo Han, Kwang-Moo Cho...