Sciweavers

909 search results - page 70 / 182
» Relational bytecode correlations
Sort
View
SSC
2007
Springer
192views Cryptology» more  SSC 2007»
15 years 4 months ago
On Boolean Functions Which Are Bent and Negabent
Bent functions f : Fm 2 → F2 achieve largest distance to all linear functions. Equivalently, their spectrum with respect to the Hadamard-Walsh transform is flat (i.e. all spectr...
Matthew G. Parker, Alexander Pott
NDSS
2005
IEEE
15 years 3 months ago
Enriching Intrusion Alerts Through Multi-Host Causality
Current intrusion detection systems point out suspicious states or events but do not show how the suspicious state or events relate to other states or events in the system. We sho...
Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lu...
INFOCOM
2003
IEEE
15 years 3 months ago
Asymptotic Insensitivity of Least-Recently-Used Caching to Statistical Dependency
Abstract— We investigate a widely popular Least-RecentlyUsed (LRU) cache replacement algorithm with semi-Markov modulated requests. Semi-Markov processes provide the flexibility...
Predrag R. Jelenkovic, Ana Radovanovic
AFRIGRAPH
2003
ACM
15 years 3 months ago
Development of a real time image based object recognition method for mobile AR-devices
In this paper we describe an image based object recognition and tracking method for mobile AR-devices and the correlative process to generate the required data. The object recogni...
Jürgen Gausemeier, Jürgen Fründ, Ca...
NOMS
2002
IEEE
15 years 2 months ago
Message tracking in SOAP-based Web services
As web services become more prevalent, the nature of electronic transactions on the Internet changes from simple browser-to-business clicks to an orchestrated flow of messages bet...
Akhil Sahai, Vijay Machiraju, Jinsong Ouyang, Klau...