Sciweavers

1953 search results - page 245 / 391
» codes 2010
Sort
View
123
Voted
JSAC
2010
84views more  JSAC 2010»
15 years 3 months ago
A little feedback can simplify sensor network cooperation
—Shannon’s discovery of digital communication has shaped the architecture of virtually all communication systems in use today. The digital communication paradigm is built aroun...
Anand D. Sarwate, Michael Gastpar
JSS
2010
91views more  JSS 2010»
15 years 3 months ago
Assessing the impact of global variables on program dependence and dependence clusters
This paper presents results of a study of the effect of global variables on the quantity of dependence in general and on the presence of dependence clusters in particular. The pa...
David Binkley, Mark Harman, Youssef Hassoun, Syed ...
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
15 years 3 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
PTS
2010
134views Hardware» more  PTS 2010»
15 years 3 months ago
A Learning-Based Approach to Unit Testing of Numerical Software
We present an application of learning-based testing to the problem of automated test case generation (ATCG) for numerical software. Our approach uses n-dimensional polynomial model...
Karl Meinke, Fei Niu
RAID
2010
Springer
15 years 3 months ago
Community Epidemic Detection Using Time-Correlated Anomalies
Abstract. An epidemic is malicious code running on a subset of a community, a homogeneous set of instances of an application. Syzygy is an epidemic detection framework that looks f...
Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken