Sciweavers

366 search results - page 38 / 74
» Machine Function Based Control Code Algebras
Sort
View
SE
2008
13 years 10 months ago
Eliminating Trust From Application Programs By Way Of Software Architecture
: In many of today's application programs, security functionality is inseparably intertwined with the actual mission-purpose logic. As a result, the trusted code base is unnec...
Michael Franz
ECCC
2008
168views more  ECCC 2008»
13 years 8 months ago
Algebrization: A New Barrier in Complexity Theory
Any proof of P = NP will have to overcome two barriers: relativization and natural proofs. Yet over the last decade, we have seen circuit lower bounds (for example, that PP does n...
Scott Aaronson, Avi Wigderson
ESSMAC
2003
Springer
14 years 1 months ago
Joint Optimization of Wireless Communication and Networked Control Systems
Abstract. We consider a linear system, such as an estimator or a controller, in which several signals are transmitted over wireless communication channels. With the coding and medi...
Lin Xiao, Mikael Johansson, Haitham A. Hindi, Step...
CONCURRENCY
1998
115views more  CONCURRENCY 1998»
13 years 8 months ago
Falcon: On-line monitoring for steering parallel programs
Abstract Advances in high performance computing, communications, and user interfaces enable developers to construct increasingly interactive high performance applications. The Falc...
Weiming Gu, Greg Eisenhauer, Karsten Schwan, Jeffr...
ICDCS
2008
IEEE
14 years 3 months ago
Analysis of Maximum Executable Length for Detecting Text-Based Malware
The possibility of using purely text stream (keyboardenterable) as carrier of malware is under-researched and often underestimated. A text attack can happen at multiple levels, fr...
P. Kumar Manna, Sanjay Ranka, Shigang Chen