Sciweavers

366 search results - page 20 / 74
» Machine Function Based Control Code Algebras
Sort
View
EUROCRYPT
2007
Springer
14 years 1 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
TCSV
2010
13 years 2 months ago
Cauchy-Density-Based Basic Unit Layer Rate Controller for H.264/AVC
Abstract--The rate control problem has been extensively studied in parallel to the development of the different video coding standards. The bit allocation via Cauchy-density-based ...
Sergio Sanz Rodríguez, Oscar del-Ama-Esteba...
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
13 years 11 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
JIT
2004
Springer
94views Database» more  JIT 2004»
14 years 26 days ago
Self-accounting as Principle for Portable CPU Control in Java
In this paper we present a novel scheme for portable CPU accounting and control in Java, which is based on program transformation techniques and can be used with every standard Jav...
Walter Binder, Jarle Hulaas
INFOVIS
2005
IEEE
14 years 1 months ago
The Visual Code Navigator: An Interactive Toolset for Source Code Investigation
We present the Visual Code Navigator, a set of three interrelated visual tools that we developed for exploring large source code software projects from three different perspective...
Gerard Lommerse, Freek Nossin, Lucian Voinea, Alex...