Sciweavers

556 search results - page 79 / 112
» A Comparative Study of Some Generalized Rough Approximations
Sort
View
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
COLING
2010
13 years 3 months ago
Multiword Expressions in the wild? The mwetoolkit comes in handy
The mwetoolkit is a tool for automatic extraction of Multiword Expressions (MWEs) from monolingual corpora. It both generates and validates MWE candidates. The generation is based...
Carlos Ramisch, Aline Villavicencio, Christian Boi...
PLDI
2010
ACM
14 years 1 months ago
An analysis of the dynamic behavior of JavaScript programs
The JavaScript programming language is widely used for web programming and, increasingly, for general purpose computing. As such, improving the correctness, security and performan...
Gregor Richards, Sylvain Lebresne, Brian Burg, Jan...
TCOM
2008
131views more  TCOM 2008»
13 years 8 months ago
Accurate estimation of the Hurst parameter of long-range dependent traffic using modified Allan and Hadamard variances
Abstract--Internet traffic exhibits self-similarity and longrange dependence (LRD) on various time scales. In this paper, we propose to use the Modified Allan Variance (MAVAR) and ...
Stefano Bregni, Luca Jmoda
COMBINATORICS
2000
84views more  COMBINATORICS 2000»
13 years 8 months ago
A Note on the Asymptotic Behavior of the Heights in b-Tries for b Large
We study the limiting distribution of the height in a generalized trie in which external nodes are capable to store up to b items (the so called b-tries). We assume that such a tr...
Charles Knessl, Wojciech Szpankowski