Sciweavers

2621 search results - page 48 / 525
» Near orders and codes
Sort
View
APLAS
2010
ACM
14 years 10 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
DCC
2006
IEEE
15 years 9 months ago
Evaluation codes and plane valuations
Abstract. We apply tools coming from singularity theory, as Hamburger-Noether expansions, and from valuation theory, as generating sequences, to explicitly describe order functions...
C. Galindo, M. Sanchis
ACSAC
2007
IEEE
15 years 4 months ago
Spector: Automatically Analyzing Shell Code
Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
Kevin Borders, Atul Prakash, Mark Zielinski
MM
2006
ACM
149views Multimedia» more  MM 2006»
15 years 3 months ago
3D TV using MPEG-2 and H.264 view coding and autostereoscopic displays
There is a renewed interest in the 3DTV research primarily due to the advances in low cost 3D display technologies. The two views required for 3DTV can be compressed using standar...
Lakis Christodoulou, Liam M. Mayron, Hari Kalva, O...
DATE
2005
IEEE
171views Hardware» more  DATE 2005»
15 years 3 months ago
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems
As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space r...
Ozcan Ozturk, Hendra Saputra, Mahmut T. Kandemir, ...