Sciweavers

1716 search results - page 321 / 344
» Proving Conditional Termination
Sort
View
101
Voted
NDSS
2008
IEEE
15 years 7 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
106
Voted
VTC
2008
IEEE
138views Communications» more  VTC 2008»
15 years 7 months ago
Mobile IP as an Enabling Technology for VoIP in Metropolitan Wireless Mesh Networks
—Metropolitan wireless mesh networks are being deployed to provide broadband connectivity to city-wide hotspots. However, its commercial feasibility and business model have not y...
Andres Arjona, Antti Ylä-Jääski
FOCS
2007
IEEE
15 years 7 months ago
On the Hardness and Smoothed Complexity of Quasi-Concave Minimization
In this paper, we resolve the smoothed and approximative complexity of low-rank quasi-concave minimization, providing both upper and lower bounds. As an upper bound, we provide th...
Jonathan A. Kelner, Evdokia Nikolova
109
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
Multicast Scheduling in Cellular Data Networks
— Multicast is an efficient means of transmitting the same content to multiple receivers while minimizing network resource usage. Applications that can benefit from multicast s...
Hyungsuk Won, Han Cai, Do Young Eun, Katherine Guo...
NOCS
2007
IEEE
15 years 7 months ago
Transaction-Based Communication-Centric Debug
Abstract— The behaviour of systems on chip (SOC) is complex because they contain multiple processors that interact through concurrent interconnects, such as networks on chip (NOC...
Kees Goossens, Bart Vermeulen, Remco van Steeden, ...