Sciweavers

1424 search results - page 56 / 285
» Improving on Version Stamps
Sort
View
RFIDSEC
2010
14 years 5 months ago
EC-RAC: Enriching a Capacious RFID Attack Collection
Abstract. We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of attacks concerns the compositional approach used to construct a parti...
Ton van Deursen, Sasa Radomirovic
ICAS
2005
IEEE
130views Robotics» more  ICAS 2005»
15 years 4 months ago
Reno Friendly TCP Westwood based on Router Buffer Estimation
— TCP Reno versions are widely used in current network, however it has been actualized that their throughput deteriorates in high-speed network and wireless environments. To over...
Kazumi Kaneko, Jiro Katto
PASTE
1998
ACM
15 years 2 months ago
Efficient Composite Data Flow Analysis Applied to Concurrent Programs
FLAVERS, a tool for verifying properties of concurrent systems, uses composite data flow analysis to incrementally improve the precision of the results of its verifications. Altho...
Gleb Naumovich, Lori A. Clarke, Leon J. Osterweil
ICMCS
2010
IEEE
186views Multimedia» more  ICMCS 2010»
15 years 4 days ago
Worthy visual content on mobile through interactive video streaming
This paper builds on an interactive streaming architecture that supports both user feedback interpretation, and temporal juxtaposition of multiple video bitstreams in a single str...
Ivan Alen Fernandez, Christophe De Vleeschouwer, F...
ESE
2006
97views Database» more  ESE 2006»
14 years 11 months ago
An empirical study of fine-grained software modifications
Software is typically improved and modified in small increments (we refer to each of these increments as a modification record--MR). MRs are usually stored in a configuration manag...
Daniel M. Germán