Sciweavers

1290 search results - page 174 / 258
» Data Dependence Testing in Practice
Sort
View
118
Voted
ACMSE
2006
ACM
15 years 8 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin
89
Voted
ICCSA
2005
Springer
15 years 8 months ago
Ascent Phase Trajectory Optimization for a Hypersonic Vehicle Using Nonlinear Programming
In this paper we present a nonlinear programming solution to one of the most challenging problems in trajectory optimization. Unlike most aerospace trajectory optimization problems...
H. M. Prasanna, D. Ghose, M. S. Bhat, Chiranjib Bh...
128
Voted
DAC
2007
ACM
15 years 6 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
141
Voted
ACIVS
2009
Springer
15 years 6 months ago
Unsupervised Detection of Gradual Video Shot Changes with Motion-Based False Alarm Removal
The temporal segmentation of a video into shots is a fundamental prerequisite for video retrieval. There are two types of shot boundaries: abrupt shot changes (“cuts”) and grad...
Ralph Ewerth, Bernd Freisleben
107
Voted
APCCM
2008
15 years 4 months ago
Constraint Acquisition - You Can Chase but You Cannot Find
We identify established tableaux techniques as an invaluable tool for semantic knowledge acquisition in the design process of relational databases. Sample databases allow users an...
Sven Hartmann, Sebastian Link, Thu Trinh