Sciweavers

4037 search results - page 505 / 808
» Routing without ordering
Sort
View
ESORICS
2009
Springer
16 years 5 months ago
Content Delivery Networks: Protection or Threat?
Content Delivery Networks (CDNs) are commonly believed to offer their customers protection against application-level denial of service (DoS) attacks. Indeed, a typical CDN with its...
Sipat Triukose, Zakaria Al-Qudah, Michael Rabinovi...
CADE
2009
Springer
16 years 5 months ago
Decidability Results for Saturation-Based Model Building
Abstract. Saturation-based calculi such as superposition can be successfully instantiated to decision procedures for many decidable fragments of first-order logic. In case of termi...
Matthias Horbach, Christoph Weidenbach
SIGCSE
2009
ACM
150views Education» more  SIGCSE 2009»
16 years 5 months ago
Dereferee: exploring pointer mismanagement in student code
Dynamic memory management and the use of pointers are critical topics in teaching the C++ language. They are also some of the most difficult for students to grasp properly. The re...
Anthony Allevato, Manuel A. Pérez-Qui&ntild...
CICLING
2009
Springer
16 years 5 months ago
Improved Unsupervised Name Discrimination with Very Wide Bigrams and Automatic Cluster Stopping
We cast name discrimination as a problem in clustering short contexts. Each occurrence of an ambiguous name is treated independently, and represented using second?order context vec...
Ted Pedersen
CHES
2009
Springer
192views Cryptology» more  CHES 2009»
16 years 5 months ago
CDs Have Fingerprints Too
Abstract. We introduce a new technique for extracting unique fingerprints from identical CDs. The proposed technique takes advantage of manufacturing variability found in the lengt...
Ghaith Hammouri, Aykutlu Dana, Berk Sunar