Sciweavers

2081 search results - page 246 / 417
» codes 2006
Sort
View
ENTCS
2006
107views more  ENTCS 2006»
14 years 11 months ago
Exact and Portable Profiling for the JVM Using Bytecode Instruction Counting
This paper presents a novel profiling approach, which is entirely based on program transformation techniques in order to enable exact profiling, preserving complete call stacks, m...
Walter Binder, Jarle Hulaas
COMCOM
2007
98views more  COMCOM 2007»
14 years 11 months ago
Anomaly detection in TCP/IP networks using immune systems paradigm
The paper presents an architecture of an anomaly detection system based on the paradigm of artificial immune systems (AISs). Incoming network traffic data are considered by the s...
Franciszek Seredynski, Pascal Bouvry
AAECC
2006
Springer
133views Algorithms» more  AAECC 2006»
14 years 11 months ago
On the low hamming weight discrete logarithm problem for nonadjacent representations
So-called nonadjacent representations are commonly used in elliptic curve cryptography to facilitate computing a scalar multiple of a point on an elliptic curve. A nonadjacent rep...
James A. Muir, Douglas R. Stinson
DCC
2006
IEEE
15 years 10 months ago
New quasi-symmetric designs constructed using mutually orthogonal Latin squares and Hadamard matrices
Using Hadamard matrices and mutually orthogonal Latin squares, we construct two new quasi-symmetric designs, with parameters 2 (66, 30, 29) and 2 - (78, 36, 30). These are the fir...
Carl Bracken, Gary McGuire, Harold N. Ward
ETFA
2006
IEEE
15 years 5 months ago
Operating Systems Portability: 8 bits and beyond
Embedded software often needs to be ported from one system to another. This may happen for a number of reasons among which are the need for using less expensive hardware or the ne...
Hugo Marcondes, Arliones Stevert Hoeller, Lucas Fr...