Sciweavers

523 search results - page 31 / 105
» codes 2011
Sort
View
ICDCS
2011
IEEE
14 years 2 days ago
LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks
—Code dissemination in wireless sensor networks refers to the process of disseminating a new code image via wireless links to all sensor nodes after they are deployed. It is desi...
Rui Zhang 0007, Yanchao Zhang
ICSE
2011
IEEE-ACM
14 years 3 months ago
A lightweight code analysis and its role in evaluation of a dependability case
A dependability case is an explicit, end-to-end argument, based on concrete evidence, that a system satisfies a critical property. We report on a case study constructing a depend...
Joseph P. Near, Aleksandar Milicevic, Eunsuk Kang,...
113
Voted
NFM
2011
254views Formal Methods» more  NFM 2011»
14 years 7 months ago
A Tabular Expression Toolbox for Matlab/Simulink
Abstract. Tabular expressions have been successfully used in developing safety critical systems, however insufficient tool support has hampered their wider adoption. To address thi...
Colin Eles, Mark Lawford
IACR
2011
122views more  IACR 2011»
14 years 3 days ago
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These...
Palash Sarkar
APPROX
2011
Springer
272views Algorithms» more  APPROX 2011»
14 years 14 days ago
Public Key Locally Decodable Codes with Short Keys
This work considers locally decodable codes in the computationally bounded channel model. The computationally bounded channel model, introduced by Lipton in 1994, views the channe...
Brett Hemenway, Rafail Ostrovsky, Martin J. Straus...