Sciweavers

195 search results - page 35 / 39
» Perfect Byte-Correcting Codes
Sort
View
109
Voted
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
16 years 2 days ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith
OSDI
2006
ACM
16 years 2 days ago
From Uncertainty to Belief: Inferring the Specification Within
Automatic tools for finding software errors require a set of specifications before they can check code: if they do not know what to check, they cannot find bugs. This paper presen...
Ted Kremenek, Paul Twohey, Godmar Back, Andrew Y. ...
PIMRC
2008
IEEE
15 years 6 months ago
Multiplexing precoding scheme for STC-CPM with parametric phase discriminator IWM receiver
—A constant envelope Continuous Phase Modulation (CPM) class of Multi-Channel (MC) modulations for multiantenna transmitters is considered. Each receive antenna receives a superp...
Jan Sykora, Robert Schober
ICC
2007
IEEE
146views Communications» more  ICC 2007»
15 years 6 months ago
Correlation Based Rate Adaptation via Insights from Incomplete Observations in 802.11 Networks
—Rate adaptation, as a challenging issue for wireless purpose. Relatively little attention has been paid on identifying network design, has been an active research topic for year...
Xia Zhou, Jun Zhao, Guang-Hua Yang
ISW
2007
Springer
15 years 6 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...