Sciweavers

293 search results - page 56 / 59
» Formal Security Analysis with Interacting State Machines
Sort
View
AGENTS
2000
Springer
13 years 12 months ago
Automated assistants to aid humans in understanding team behaviors
Multi-agent teamwork is critical in a large number of agent applications, including training, education, virtual enterprises and collective robotics. Tools that can help humans an...
Taylor Raines, Milind Tambe, Stacy Marsella
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
14 years 28 days ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
SYSTOR
2010
ACM
14 years 10 days ago
On the DMA mapping problem in direct device assignment
I/O intensive workloads running in virtual machines can suffer massive performance degradation. Direct assignment of I/O devices to virtual machines is the best performing I/O vir...
Ben-Ami Yassour, Muli Ben-Yehuda, Orit Wasserman
PLDI
2003
ACM
14 years 23 days ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
CGF
2010
199views more  CGF 2010»
13 years 6 months ago
Time-of-Flight Cameras in Computer Graphics
A growing number of applications depend on accurate and fast 3D scene analysis. Examples are model and lightfield acquisition, collision prevention, mixed reality, and gesture re...
Andreas Kolb, Erhardt Barth, Reinhard Koch, Rasmus...