Sciweavers

749 search results - page 143 / 150
» Scenario based Analysis of Linear Computations
Sort
View
97
Voted
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
15 years 5 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
ESA
2009
Springer
122views Algorithms» more  ESA 2009»
15 years 6 months ago
Bounded Budget Betweenness Centrality Game for Strategic Network Formations
In this paper, we introduce the bounded budget betweenness centrality game, a strategic network formation game in which nodes build connections subject to a budget constraint in or...
Xiaohui Bei, Wei Chen, Shang-Hua Teng, Jialin Zhan...
ACSAC
2002
IEEE
15 years 4 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
IJDE
2007
123views more  IJDE 2007»
14 years 11 months ago
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...
Georgia Frantzeskou, Efstathios Stamatatos, Stefan...
TVCG
2008
147views more  TVCG 2008»
14 years 11 months ago
Interactive Visual Steering - Rapid Visual Prototyping of a Common Rail Injection System
Interactive steering with visualization has been a common goal of the visualization research community for twenty years, but it is rarely ever realized in practice. In this paper w...
Kresimir Matkovic, Denis Gracanin, Mario Jelovic, ...