Sciweavers

222 search results - page 10 / 45
» Flow Analysis of Code Customizations
Sort
View
INFOCOM
2009
IEEE
14 years 1 months ago
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen
ICC
2009
IEEE
239views Communications» more  ICC 2009»
14 years 1 months ago
An Analytical Approach for Throughput Evaluation of Wireless Network Coding
In this paper, we propose a new analytical model for throughput evaluation of wireless network coding. This new approach is based on a probabilistic viewpoint on network coding, i....
Mohammad H. Amerimehr, Farid Ashtiani, Mohammad Ba...
SAS
2005
Springer
127views Formal Methods» more  SAS 2005»
14 years 5 days ago
Banshee: A Scalable Constraint-Based Analysis Toolkit
Abstract. We introduce Banshee, a toolkit for constructing constraintbased analyses. Banshee’s novel features include a code generator for creating customized constraint resoluti...
John Kodumal, Alexander Aiken
PIMRC
2010
IEEE
13 years 4 months ago
Energy-delay tradeoff analysis in embedded M2M networks with channel coding
Abstract--Machine-to-Machine (M2M), an emerging communications paradigm, is a facilitator of data flows between machines used, e.g., in mission-critical applications. Focusing in t...
Tatjana Predojev, Jesus Alonso-Zarate, Mischa Dohl...
WCET
2010
13 years 4 months ago
A Code Policy Guaranteeing Fully Automated Path Analysis
Calculating the worst-case execution time (WCET) of real-time tasks is still a tedious job. Programmers are required to provide additional information on the program flow, analyzi...
Benedikt Huber, Peter P. Puschner