Sciweavers

698 search results - page 6 / 140
» Evaluating Key Statements Analysis
Sort
View
WISEC
2010
ACM
14 years 1 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
JILP
2000
87views more  JILP 2000»
13 years 8 months ago
Design and Analysis of Profile-Based Optimization in Compaq's Compilation Tools for Alpha
This paper describes and evaluates the profile-based optimizations in the Compaq C compiler tool chain for Alpha. The optimizations include superblock formation, inlining, command...
Robert S. Cohn, P. Geoffrey Lowney
CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 8 months ago
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images
this paper demonstrates analysis of well known block cipher CAST-128 and its modified version using avalanche criterion and other tests namely encryption quality, correlation coeff...
G. N. Krishnamurthy, V. Ramaswamy
IEEEPACT
2006
IEEE
14 years 2 months ago
An empirical evaluation of chains of recurrences for array dependence testing
Code restructuring compilers rely heavily on program analysis techniques to automatically detect data dependences between program statements. Dependences between statement instanc...
Johnnie Birch, Robert A. van Engelen, Kyle A. Gall...
NAACL
2003
13 years 10 months ago
Evaluating the Evaluation: A Case Study Using the TREC 2002 Question Answering Track
Evaluating competing technologies on a common problem set is a powerful way to improve the state of the art and hasten technology transfer. Yet poorly designed evaluations can was...
Ellen M. Voorhees