Sciweavers

195 search results - page 35 / 39
» Perfect Byte-Correcting Codes
Sort
View
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
16 years 3 months ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith
OSDI
2006
ACM
16 years 3 months ago
From Uncertainty to Belief: Inferring the Specification Within
Automatic tools for finding software errors require a set of specifications before they can check code: if they do not know what to check, they cannot find bugs. This paper presen...
Ted Kremenek, Paul Twohey, Godmar Back, Andrew Y. ...
143
Voted
PIMRC
2008
IEEE
15 years 10 months ago
Multiplexing precoding scheme for STC-CPM with parametric phase discriminator IWM receiver
—A constant envelope Continuous Phase Modulation (CPM) class of Multi-Channel (MC) modulations for multiantenna transmitters is considered. Each receive antenna receives a superp...
Jan Sykora, Robert Schober
118
Voted
ICC
2007
IEEE
146views Communications» more  ICC 2007»
15 years 10 months ago
Correlation Based Rate Adaptation via Insights from Incomplete Observations in 802.11 Networks
—Rate adaptation, as a challenging issue for wireless purpose. Relatively little attention has been paid on identifying network design, has been an active research topic for year...
Xia Zhou, Jun Zhao, Guang-Hua Yang
129
Voted
ISW
2007
Springer
15 years 9 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...