Sciweavers

3428 search results - page 586 / 686
» Making the Case
Sort
View
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
15 years 11 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
TAICPART
2006
IEEE
144views Education» more  TAICPART 2006»
15 years 11 months ago
Testing the Implementation of Business Rules Using Intensional Database Tests
One of the key roles of any information system is to enforce the business rules and policies set by the owning organisation. As for any important functionality, it is necessary to...
David Willmor, Suzanne M. Embury
VTC
2006
IEEE
154views Communications» more  VTC 2006»
15 years 11 months ago
Adaptive Modulation and Coding for Bit Interleaved Coded Multiple Beamforming
— Bit interleaved coded multiple beamforming (BICMB) was previously designed to achieve full spatial multiplexing of min(N, M) and full spatial diversity of NM for N transmit and...
Ersin Sengul, Enis Akay, Ender Ayanoglu
ACNS
2006
Springer
79views Cryptology» more  ACNS 2006»
15 years 11 months ago
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions
Abstract. In this paper, we present the rainbow attack on stream ciphers filtered by Maiorana-McFarland functions. This can be considered as a generalization of the time-memory-da...
Khoongming Khoo, Guang Gong, Hian-Kiat Lee
ACMSE
2006
ACM
15 years 11 months ago
Middleware specialization using aspect oriented programming
Standardized middleware is used to build large distributed real-time and enterprise (DRE) systems. These middleware are highly flexible and support a large number of features sin...
Dimple Kaul, Aniruddha S. Gokhale