Sciweavers

1441 search results - page 231 / 289
» Multiple instance ranking
Sort
View
IMC
2004
ACM
14 years 3 months ago
Ten fallacies and pitfalls on end-to-end available bandwidth estimation
The area of available bandwidth (avail-bw) estimation has attracted significant interest recently, with several estimation techniques and tools developed during the last 2-3 year...
Manish Jain, Constantinos Dovrolis
SACMAT
2004
ACM
14 years 3 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
14 years 3 months ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...
CSL
2004
Springer
14 years 3 months ago
A Dependent Type Theory with Names and Binding
We consider the problem of providing formal support for working tract syntax involving variable binders. Gabbay and Pitts have shown in their work on Fraenkel-Mostowski (FM) set th...
Ulrich Schöpp, Ian Stark
ESOP
2004
Springer
14 years 3 months ago
Canonical Graph Shapes
Abstract. Graphs are an intuitive model for states of a (software) system that include pointer structures — for instance, object-oriented programs. However, a naive encoding resu...
Arend Rensink