Sciweavers

7262 search results - page 367 / 1453
» Reversible Computer Hardware
Sort
View
122
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Power-Modulated Challenge-Response Schemes for Verifying Location Claims
—Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authen...
Yu Zhang, Zang Li, Wade Trappe
IWPSE
2007
IEEE
15 years 10 months ago
Structural analysis and visualization of C++ code evolution using syntax trees
We present a method to detect and visualize evolution patterns in C++ source code. Our method consists of three steps. First, we extract an annotated syntax tree (AST) from each v...
Fanny Chevalier, David Auber, Alexandru Telea
WCRE
2007
IEEE
15 years 10 months ago
Clone Detection via Structural Abstraction
tection via Structural Abstraction William S. Evans Department of Computer Science University of British Columbia Vancouver, B.C. V6T 1Z4, CANADA Christopher W. Fraser Microsoft Re...
William S. Evans, Christopher W. Fraser, Fei Ma
SP
2006
IEEE
193views Security Privacy» more  SP 2006»
15 years 10 months ago
Analysis of the Linux Random Number Generator
Linux is the most popular open source project. The Linux random number generator is part of the kernel of all Linux distributions and is based on generating randomness from entrop...
Zvi Gutterman, Benny Pinkas, Tzachy Reinman
TRIDENTCOM
2006
IEEE
15 years 10 months ago
Mapping Link SNRs of wireless mesh networks onto an indoor testbed
— As a platform for synergistic theory-experiment exploration in the field of wireless networking, wireless testbeds have been used to facilitate a broad range of research. From...
Jing Lei, Roy D. Yates, Larry J. Greenstein, Hang ...