Sciweavers

27692 search results - page 50 / 5539
» Where is ...
Sort
View
108
Voted
ACSAC
2004
IEEE
15 years 4 months ago
A Look Back at "Security Problems in the TCP/IP Protocol Suite"
About fifteen years ago, I wrote a paper on security problems in the TCP/IP protocol suite, In particular, I focused on protocol-level issues, rather than implementation flaws. It...
Steven M. Bellovin
110
Voted
CAV
2008
Springer
89views Hardware» more  CAV 2008»
15 years 2 months ago
Inferring Congruence Equations Using SAT
This paper proposes a new approach for deriving invariants that are systems of congruence equations where the modulo is a power of 2. The technique is an amalgam of SAT-solving, wh...
Andy King, Harald Søndergaard
89
Voted
APAL
2008
104views more  APAL 2008»
15 years 28 days ago
Atomic models higher up
There exists a countable structure M of Scott rank CK 1 where M 1 = CK 1 and where the LCK 1 ,-theory of M is not -categorical. The Scott rank of a model is the least ordinal whe...
Jessica Millar, Gerald E. Sacks
57
Voted
IPL
2006
98views more  IPL 2006»
15 years 23 days ago
Transforming spanning trees and pseudo-triangulations
Let TS be the set of all crossing-free straight line spanning trees of a planar n-point set S. Consider the graph TS where two members T and T of TS are adjacent if T intersects T...
Oswin Aichholzer, Franz Aurenhammer, Clemens Hueme...
79
Voted
CORR
2010
Springer
77views Education» more  CORR 2010»
15 years 11 days ago
The Binary-Symmetric Parallel-Relay Network
We present capacity results of the binary-symmetric parallel-relay network, where there is one source, one destination, and K relays in parallel. We show that forwarding relays, wh...
Lawrence Ong, Sarah J. Johnson, Christopher M. Kel...