Sciweavers

6381 search results - page 199 / 1277
» Alternative Implementation of the C
Sort
View
SPW
2005
Springer
15 years 10 months ago
Repairing the Bluetooth Pairing Protocol
Abstract. We implement and demonstrate a passive attack on the Bluetooth authentication protocol used to connect two devices to each other. Using a protocol analyzer and a brute-fo...
Frank Stajano
ENTCS
2008
139views more  ENTCS 2008»
15 years 4 months ago
Pervasive Compiler Verification - From Verified Programs to Verified Systems
We report in this paper on the formal verification of a simple compiler for the C-like programming language C0. The compiler correctness proof meets the special requirements of pe...
Dirk Leinenbach, Elena Petrova
ICALP
2005
Springer
15 years 10 months ago
Time-Space Lower Bounds for the Polynomial-Time Hierarchy on Randomized Machines
We establish the first polynomial-strength time-space lower bounds for problems in the lineartime hierarchy on randomized machines with two-sided error. We show that for any inte...
Scott Diehl, Dieter van Melkebeek
ICIAR
2004
Springer
15 years 10 months ago
Registration and Fusion of Blurred Images
We present a maximum a posteriori solution to problems of accurate registration of blurred images and recovery of an original undegraded image. Our algorithm has the advantage that...
Filip Sroubek, Jan Flusser
PRL
2006
112views more  PRL 2006»
15 years 4 months ago
Resolution enhancement via probabilistic deconvolution of multiple degraded images
We present a maximum a posteriori solution to the problem of obtaining a high-resolution image from a set of degraded low-resolution images of the same scene. The proposed algorit...
Filip Sroubek, Jan Flusser