Sciweavers

1640 search results - page 295 / 328
» Deriving Private Information from Randomized Data
Sort
View
TOOLS
2008
IEEE
14 years 3 months ago
Towards Raising the Failure of Unit Tests to the Level of Compiler-Reported Errors
Running unit tests suites with contemporary tools such as JUNIT can show the presence of bugs, but not their locations. This is different from checking a program with a compiler, w...
Friedrich Steimann, Thomas Eichstädt-Engelen,...
ICSM
2007
IEEE
14 years 3 months ago
Fault Detection Probability Analysis for Coverage-Based Test Suite Reduction
Test suite reduction seeks to reduce the number of test cases in a test suite while retaining a high percentage of the original suite’s fault detection effectiveness. Most appro...
Scott McMaster, Atif M. Memon
PAM
2007
Springer
14 years 2 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
CRYPTO
2004
Springer
86views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
On Multiple Linear Approximations
In this paper we study the long standing problem of information extraction from multiple linear approximations. We develop a formal statistical framework for block cipher attacks b...
Alex Biryukov, Christophe De Cannière, Mich...
INFOCOM
2003
IEEE
14 years 1 months ago
Energy Efficient Routing in Ad Hoc Disaster Recovery Networks
—The terrorist attacks on September 11, 2001 have drawn attention to the use of wireless technology in order to locate survivors of structural collapse. We propose to construct a...
Gil Zussman, Adrian Segall