Sciweavers

1240 search results - page 214 / 248
» Improving Memory Management Security for C and C
Sort
View
IH
2009
Springer
14 years 3 months ago
Estimating the Minimal Length of Tardos Code
Abstract. This paper estimates the minimal length of a binary probabilistic traitor tracing code. We consider the code construction proposed by G. Tardos in 2003, with the symmetri...
Teddy Furon, Luis Pérez-Freire, Arnaud Guya...
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
14 years 3 months ago
Decision Tools for Reducing Congestion at Locks on the Upper Mississippi River
This paper describes the development of tools to support better scheduling and sequencing of barge tows on a congested portion of the Upper Mississippi River. Our study section co...
James F. Campbell, L. Douglas Smith, Donald C. Swe...
PAM
2007
Springer
14 years 2 months ago
Routing Stability in Static Wireless Mesh Networks
Considerable research has focused on the design of routing protocols for wireless mesh networks. Yet, little is understood about the stability of routes in such networks. This unde...
Krishna N. Ramachandran, Irfan Sheriff, Elizabeth ...
CONEXT
2006
ACM
14 years 2 months ago
Shortcuts in a virtual world
We consider the case of a virtual world of peers that are organized in an overlay built by Delaunay Triangulation. Application layer routing is used to determine the path taken in...
Moritz Steiner, Ernst W. Biersack
CONEXT
2006
ACM
14 years 2 months ago
SMARTA: a self-managing architecture for thin access points
Optimally choosing operating parameters for access points in an enterprise wireless LAN environment is a difficult and well-studied problem. Unlike past work, the SMARTA self-man...
Nabeel Ahmed, Srinivasan Keshav