Sciweavers

1031 search results - page 77 / 207
» codes 2004
Sort
View
102
Voted
APSEC
2004
IEEE
15 years 4 months ago
Binary-Level Lightweight Data Integration to Develop Program Understanding Tools for Embedded Software in C
In embedded software development, the programming language C and inline assembly code are traditionally widely used. However, tools for C program-understanding, e.g., cross-refere...
Katsuhiko Gondow, Tomoya Suzuki II, Hayato Kawashi...
114
Voted
EUROCRYPT
2004
Springer
15 years 6 months ago
On the Hardness of Information-Theoretic Multiparty Computation
We revisit the following open problem in information-theoretic cryptography: Does the communication complexity of unconditionally secure computation depend on the computational com...
Yuval Ishai, Eyal Kushilevitz
ISCIS
2004
Springer
15 years 6 months ago
Mutation-Like Oriented Diversity for Dependability Improvement: A Distributed System Case Study
Abstract. Achieving higher levels of dependability is a goal in any software project, therefore strategies for software reliability improvement are very attractive. This work intro...
Daniel O. Bortolas, Avelino F. Zorzo, Eduardo A. B...
105
Voted
PEWASUN
2004
ACM
15 years 6 months ago
A modified IEEE 802.11 MAC protocol for MC-CDMA
In this paper, we introduce a modified version of the IEEE 802.11a protocol and evaluate its performance. The new protocol is a combination of the standard Medium Access Control (...
Georgios Orfanos, Jörg Habetha, Ling Liu
GECCO
2004
Springer
15 years 6 months ago
Subthreshold-Seeking Behavior and Robust Local Search
Subthreshold-seeking behavior occurs when the majority of the points that an algorithm samples have an evaluation less than some target threshold. We characterize sets of functions...
L. Darrell Whitley, Keith Bush, Jonathan E. Rowe