Sciweavers

1497 search results - page 233 / 300
» Extended static checking
Sort
View
TCS
2011
13 years 3 months ago
Optimizing n-variate (n+k)-nomials for small k
We give a high precision polynomial-time approximation scheme for the supremum of any honest n-variate (n + 2)-nomial with a constant term, allowing real exponents as well as real...
Philippe P. Pébay, J. Maurice Rojas, David ...
TCOM
2010
98views more  TCOM 2010»
13 years 3 months ago
Large-Girth Nonbinary QC-LDPC Codes of Various Lengths
In this paper, we construct nonbinary quasi-cyclic low-density parity-check (QC-LDPC) codes whose parity check matrices consist of an array of square sub-matrices which are either ...
Jie Huang, Lei Liu, Wuyang Zhou, Shengli Zhou
ASPLOS
2011
ACM
13 years 17 days ago
Ensuring operating system kernel integrity with OSck
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
13 years 14 days ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
BPM
2011
Springer
295views Business» more  BPM 2011»
12 years 9 months ago
Compliance by Design for Artifact-Centric Business Processes
Compliance to legal regulations, internal policies, or best practices is becoming a more and more important aspect in business processes management. Compliance requirements are usu...
Niels Lohmann