Sciweavers

2379 search results - page 340 / 476
» Computer Science in the Information Age
Sort
View
GI
2009
Springer
15 years 2 months ago
Source Conflicts in Bayesian Identification
: In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discuss...
Max Krüger, David Hirschhäuser
FOCS
2009
IEEE
15 years 11 months ago
Extracting Correlations
Abstract— Motivated by applications in cryptography, we consider a generalization of randomness extraction and the related notion of privacy amplification to the case of two cor...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
FOCS
2007
IEEE
15 years 10 months ago
Non-Linear Index Coding Outperforming the Linear Optimum
The following source coding problem was introduced by Birk and Kol: a sender holds a word x ∈ {0, 1}n , and wishes to broadcast a codeword to n receivers, R1, . . . , Rn. The re...
Eyal Lubetzky, Uri Stav
ACMSE
2006
ACM
15 years 10 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
GI
2003
Springer
15 years 9 months ago
Sichere IT-Systeme
Abstract: Die Entwicklung und Prüfung von sicheren Komponenten und einem sicheren Gesamtsystem ist das Ziel des Schwerpunktprogramm 1079 „Sicherheit in der Informations- und Kom...
Günter Müller, Sven Wohlgemuth