Sciweavers

1953 search results - page 259 / 391
» codes 2010
Sort
View
CORR
2010
Springer
84views Education» more  CORR 2010»
15 years 4 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
CORR
2010
Springer
121views Education» more  CORR 2010»
15 years 4 months ago
Symmetric Allocations for Distributed Storage
We consider the problem of optimally allocating a given total storage budget in a distributed storage system. A source has a data object which it can code and store over a set of s...
Derek Leong, Alexandros G. Dimakis, Tracey Ho
ICST
2010
IEEE
15 years 2 months ago
Automated Behavioral Regression Testing
—When a program is modified during software evolution, developers typically run the new version of the program against its existing test suite to validate that the changes made ...
Wei Jin, Alessandro Orso, Tao Xie
JFP
2010
107views more  JFP 2010»
15 years 2 months ago
Lightweight checkpointing for concurrent ML
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Suresh Jagannathan
PVLDB
2010
158views more  PVLDB 2010»
15 years 2 months ago
MEET DB2: Automated Database Migration Evaluation
Commercial databases compete for market share, which is composed of not only net-new sales to those purchasing a database for the first time, but also competitive “win-backs”...
Reynold Xin, Patrick Dantressangle, Sam Lightstone...