Sciweavers

677 search results - page 115 / 136
» Reverse Engineering is Reverse Forward Engineering
Sort
View
IH
2004
Springer
15 years 3 months ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn
INFOVIS
2003
IEEE
15 years 3 months ago
Multiscale Visualization of Small World Networks
Many networks under study in Information Visualization are “small world” networks. These networks first appeared in the study social networks and were shown to be relevant mod...
David Auber, Yves Chiricota, Fabien Jourdan, Guy M...
IRI
2003
IEEE
15 years 3 months ago
An Information Model of Virtual Collaboration
Distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collabo...
Robert P. Biuk-Aghai
KCAP
2003
ACM
15 years 2 months ago
Learning programs from traces using version space algebra
While existing learning techniques can be viewed as inducing programs from examples, most research has focused on rather narrow classes of programs, e.g., decision trees or logic ...
Tessa A. Lau, Pedro Domingos, Daniel S. Weld
ACNS
2003
Springer
147views Cryptology» more  ACNS 2003»
15 years 2 months ago
Side-Channel Attack on Substitution Blocks
1 We describe a side-channel attack on a substitution block, which is usually implemented as a table lookup operation. In particular, we have investigated smartcard implementations...
Roman Novak