Sciweavers

172 search results - page 30 / 35
» HotComments: How to Make Program Comments More Useful
Sort
View
STOC
2010
ACM
295views Algorithms» more  STOC 2010»
14 years 16 days ago
Approximation Schemes for Steiner Forest on Planar Graphs and Graphs of Bounded Treewidth
We give the first polynomial-time approximation scheme (PTAS) for the Steiner forest problem on planar graphs and, more generally, on graphs of bounded genus. As a first step, w...
MohammadHossein Bateni, MohammadTaghi Hajiaghayi a...
SP
1999
IEEE
132views Security Privacy» more  SP 1999»
13 years 12 months ago
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)
This paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it is employed in the development of a modern generic ...
Ulf Lindqvist, Phillip A. Porras
APCHI
1998
IEEE
13 years 12 months ago
A Framework for Event-Driven Demonstration based on the Java Toolkit
An event-driven demonstration is to show the behavior of an application by re-executing the captured events. It is used to provide help regarding how an application works because ...
Motoki Miura, Jiro Tanaka
CCS
2008
ACM
13 years 9 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
AFRICACRYPT
2009
Springer
14 years 2 months ago
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the efforts required for a complete break of remote keyless...
Markus Kasper, Timo Kasper, Amir Moradi, Christof ...