Sciweavers

1290 search results - page 174 / 258
» Data Dependence Testing in Practice
Sort
View
ACMSE
2006
ACM
14 years 2 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin
ICCSA
2005
Springer
14 years 2 months ago
Ascent Phase Trajectory Optimization for a Hypersonic Vehicle Using Nonlinear Programming
In this paper we present a nonlinear programming solution to one of the most challenging problems in trajectory optimization. Unlike most aerospace trajectory optimization problems...
H. M. Prasanna, D. Ghose, M. S. Bhat, Chiranjib Bh...
DAC
2007
ACM
14 years 27 days ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
ACIVS
2009
Springer
14 years 9 days ago
Unsupervised Detection of Gradual Video Shot Changes with Motion-Based False Alarm Removal
The temporal segmentation of a video into shots is a fundamental prerequisite for video retrieval. There are two types of shot boundaries: abrupt shot changes (“cuts”) and grad...
Ralph Ewerth, Bernd Freisleben
APCCM
2008
13 years 10 months ago
Constraint Acquisition - You Can Chase but You Cannot Find
We identify established tableaux techniques as an invaluable tool for semantic knowledge acquisition in the design process of relational databases. Sample databases allow users an...
Sven Hartmann, Sebastian Link, Thu Trinh