Sciweavers

2060 search results - page 112 / 412
» Some Applications of Coding Theory in Computational Complexi...
Sort
View
ISW
2007
Springer
15 years 4 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
CORR
1999
Springer
139views Education» more  CORR 1999»
14 years 9 months ago
Combinatorics of branchings in higher dimensional automata
ABSTRACT. We explore the combinatorial properties of the branching areas of execution paths in higher dimensional automata. Mathematically, this means that we investigate the combi...
Philippe Gaucher
INFOCOM
2009
IEEE
15 years 4 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
SIGCSE
2009
ACM
130views Education» more  SIGCSE 2009»
15 years 10 months ago
Introducing PyLighter: dynamic code highlighter
Like a screenplay, a program is both a static artifact and instructions for a dynamic performance. This duality can keep laypeople from appreciating the complexity of software sys...
Michael G. Boland, Curtis C. Cliburn
FPL
2008
Springer
131views Hardware» more  FPL 2008»
14 years 11 months ago
Enhancing COPACOBANA for advanced applications in cryptography and cryptanalysis
Cryptanalysis of symmetric and asymmetric ciphers is a challenging task due to the enormous amount of involved computations. To tackle this computational complexity, usually the e...
Tim Güneysu, Christof Paar, Gerd Pfeiffer, Ma...