Sciweavers

503 search results - page 70 / 101
» Using The Same System For Analyzing And Synthesizing Sentenc...
Sort
View
SUTC
2010
IEEE
15 years 1 months ago
Link Scheduling in a Single Broadcast Domain Underwater Networks
Because radio waves decay rapidly in sea water, acoustic communication is the most popular choic for underwater sensor networks. However, since the propagation speed of acoustic w...
Pai-Han Huang, Ying Chen, Bhaskar Krishnamachari, ...
COMPSAC
2009
IEEE
15 years 2 months ago
Temporally Robust Software Features for Authorship Attribution
Authorship attribution is used to determine the creator of works among many candidates, playing a vital role in software forensics, authorship disputes and academic integrity inve...
Steven Burrows, Alexandra L. Uitdenbogerd, Andrew ...
PET
2004
Springer
15 years 3 months ago
On Flow Correlation Attacks and Countermeasures in Mix Networks
In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes have been used in many anonymous communication s...
Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati,...
NIPS
1996
14 years 11 months ago
Predicting Lifetimes in Dynamically Allocated Memory
Predictions oflifetimesofdynamicallyallocated objects can be used to improve time and space e ciency of dynamic memory management in computer programs. Barrett and Zorn 1993] used...
David A. Cohn, Satinder P. Singh
ICSE
2005
IEEE-ACM
15 years 9 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...