Sciweavers

1249 search results - page 163 / 250
» Limitations of the Even-Mansour Construction
Sort
View
PRDC
2006
IEEE
14 years 4 months ago
Detecting and Exploiting Symmetry in Discrete-state Markov Models
Dependable systems are usually designed with multiple instances of components or logical processes, and often possess symmetries that may be exploited in model-based evaluation. T...
W. Douglas Obal II, Michael G. McQuinn, William H....
SCAM
2006
IEEE
14 years 4 months ago
Factoring Differences for Iterative Change Management
An approach for factoring source-code differences is presented. A single large difference between two versions of a program is decomposed into factors (i.e., smaller changes). The...
Michael L. Collard, Huzefa H. Kagdi, Jonathan I. M...
VTC
2006
IEEE
117views Communications» more  VTC 2006»
14 years 4 months ago
Frequency-Domain Eigenbeam-SDM and Equalization for High Speed Data Transmissions
— In wireless communications, the channel consists of many resolvable paths with different time delays, resulting in a severely frequency-selective fading channel. The frequencyd...
Kazuyuki Ozaki, Akinori Nakajima, Fumiyuki Adachi
PLDI
2006
ACM
14 years 4 months ago
A microkernel virtual machine: : building security with clear interfaces
In this paper we propose a novel microkernel-based virtual machine (µKVM), a new code-based security framework with a simple and declarative security architecture. The main desig...
Xiaoqi Lu, Scott F. Smith
PPPJ
2006
ACM
14 years 4 months ago
Enabling Java mobile computing on the IBM Jikes research virtual machine
Today’s complex applications must face the distribution of data and code among different network nodes. Java is a wide-spread language that allows developers to build complex so...
Giacomo Cabri, Letizia Leonardi, Raffaele Quitadam...