Sciweavers

2068 search results - page 123 / 414
» On Effectiveness of Application-Layer Coding
Sort
View
143
Voted
BIRTHDAY
2006
Springer
15 years 8 months ago
Verification by Parallelization of Parametric Code
Abstract. Loops and other unbound control structures constitute a major bottleneck in formal software verification, because correctness proofs over such control structures generall...
Tobias Gedell, Reiner Hähnle
NIPS
2004
15 years 5 months ago
Sparse Coding of Natural Images Using an Overcomplete Set of Limited Capacity Units
It has been suggested that the primary goal of the sensory system is to represent input in such a way as to reduce the high degree of redundancy. Given a noisy neural representati...
Eizaburo Doi, Michael S. Lewicki
ESORICS
2010
Springer
15 years 5 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
DIMVA
2009
15 years 5 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
148
Voted
TCOM
2010
145views more  TCOM 2010»
15 years 2 months ago
Blind Cooperative Diversity Using Distributed Space-Time Coding in Block Fading Channels
— Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time encoded transmission. In this paper, we consider a scheme in whic...
Kamel Tourki, Mohamed-Slim Alouini, Luc Deneire