Sciweavers

2237 search results - page 75 / 448
» On the Security of Random Sources
Sort
View
CSMR
2009
IEEE
15 years 11 months ago
Static Security Analysis Based on Input-Related Software Faults
It is important to focus on security aspects during the development cycle to deliver reliable software. However, locating security faults in complex systems is difficult and ther...
Csaba Nagy, Spiros Mancoridis
CISS
2008
IEEE
15 years 11 months ago
Near optimal lossy source coding and compression-based denoising via Markov chain Monte Carlo
— We propose an implementable new universal lossy source coding algorithm. The new algorithm utilizes two wellknown tools from statistical physics and computer science: Gibbs sam...
Shirin Jalali, Tsachy Weissman
EDBT
2006
ACM
120views Database» more  EDBT 2006»
16 years 5 months ago
Query Planning in the Presence of Overlapping Sources
Navigational queries on Web-accessible life science sources pose unique query optimization challenges. The objects in these sources are interconnected to objects in other sources, ...
Jens Bleiholder, Samir Khuller, Felix Naumann, Lou...
ICRA
2009
IEEE
155views Robotics» more  ICRA 2009»
15 years 11 months ago
Monte Carlo simultaneous localization of multiple unknown transient radio sources using a mobile robot with a directional antenn
— We report our system and algorithm developments that enable a single mobile robot equipped with a directional antenna to simultaneously localize multiple unknown transient radi...
Dezhen Song, Chang-Young Kim, Jingang Yi
INFOCOM
2003
IEEE
15 years 10 months ago
Goodput Analysis of a Fluid Queue with Selective Discarding and a Responsive Bursty Source
Abstract— In this paper we analyse a feedback system consisting of a finite buffer fluid queue and a responsive source. The source alternates between silence periods and active...
Parijat Dube, Eitan Altman