Sciweavers

436 search results - page 72 / 88
» On two variations of identifying codes
Sort
View
CORR
2010
Springer
126views Education» more  CORR 2010»
14 years 4 months ago
Reed Muller Sensing Matrices and the LASSO
We construct two families of deterministic sensing matrices where the columns are obtained by exponentiating codewords in the quaternary Delsarte-Goethals code DG(m, r). This meth...
A. Robert Calderbank, Sina Jafarpour
ICONFERENCE
2011
14 years 4 months ago
Epistemic presumptions of authorship
The major concern of this paper is the cultural ramification of the bibliographic conception of “authorship.” Beginning with Foucault’s question “what is an author” and ...
Richard P. Smiraglia, Hur-Li Lee, Hope A. Olson
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 1 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
ICSE
2011
IEEE-ACM
14 years 1 months ago
Pragmatic prioritization of software quality assurance efforts
A plethora of recent work leverages historical data to help practitioners better prioritize their software quality assurance efforts. However, the adoption of this prior work in p...
Emad Shihab
ASPLOS
2004
ACM
15 years 3 months ago
Secure program execution via dynamic information flow tracking
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of sp...
G. Edward Suh, Jae W. Lee, David Zhang, Srinivas D...