Sciweavers

1448 search results - page 230 / 290
» From Requirements to Code Revisited
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
The value of redundant measurement in compressed sensing
The aim of compressed sensing is to recover attributes of sparse signals using very few measurements. Given an overall bit budget for quantization, this paper demonstrates that th...
Victoria Kostina, Marco F. Duarte, Sina Jafarpour,...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
13 years 1 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
PPOPP
2011
ACM
13 years 27 days ago
ScalaExtrap: trace-based communication extrapolation for spmd programs
Performance modeling for scientific applications is important for assessing potential application performance and systems procurement in high-performance computing (HPC). Recent ...
Xing Wu, Frank Mueller
CSFW
2011
IEEE
12 years 10 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
CORR
2012
Springer
192views Education» more  CORR 2012»
12 years 5 months ago
Rapid Application Development Using Software Factories
: Software development is still based on manufactory production, and most of the programming code is still hand-crafted. Software development is very far away from the ultimate goa...
Toni Stojanovski, Tomislav Dzekov