Sciweavers

7924 search results - page 165 / 1585
» Non-Malleable Functions and Their Applications
Sort
View
ICSM
2003
IEEE
14 years 2 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
MSE
2000
IEEE
118views Hardware» more  MSE 2000»
14 years 1 months ago
MPEG Video Streaming with VCR Functionality
—With the proliferation of online multimedia content, the popularity of multimedia streaming technology, and the establishment of MPEG video coding standards, it is important to ...
Chia-Wen Lin, Jeongnam Youn, Jian Zhou, Ming-Ting ...
CAV
2004
Springer
108views Hardware» more  CAV 2004»
14 years 26 days ago
Functional Dependency for Verification Reduction
Abstract. The existence of functional dependency among the state variables of a state transition system was identified as a common cause of inefficient BDD representation in formal...
Jie-Hong Roland Jiang, Robert K. Brayton
BIOADIT
2006
Springer
14 years 26 days ago
Packet Classification with Evolvable Hardware Hash Functions - An Intrinsic Approach
Bandwidth demands of communication networks are rising permanently. Thus, the requirements to modern routers regarding packet classification are rising accordingly. Conventional al...
Harald Widiger, Ralf Salomon, Dirk Timmermann
NC
1998
13 years 10 months ago
An Addition to Backpropagation for Computing Functional Roots
Many processes are composed of a n-fold repetition of some simpler process. If the whole process can be modeled with a neural network, we present a method to derive a model of the...
Lars Kindermann