Sciweavers

372 search results - page 10 / 75
» On Codings of Traces
Sort
View
102
Voted
AAECC
2006
Springer
114views Algorithms» more  AAECC 2006»
15 years 9 months ago
Traitor Tracing Against Powerful Attacks Using Combinatorial Designs
This paper addresses the problem of threshold traitor tracing for digital content where, by embedding appropriate digital patterns into the distributed content, it is possible to t...
Simon McNicol, Serdar Boztas, Asha Rao
125
Voted
CODES
2001
IEEE
15 years 7 months ago
A trace transformation technique for communication refinement
Models of computation like Kahn and dataflow process networks provide convenient means for modeling signal processing applicahis is partly due to the abstract primitives that thes...
Paul Lieverse, Pieter van der Wolf, Ed F. Deprette...
144
Voted
ICS
1999
Tsinghua U.
15 years 8 months ago
Software trace cache
—This paper explores the use of compiler optimizations which optimize the layout of instructions in memory. The target is to enable the code to make better use of the underlying ...
Alex Ramírez, Josep-Lluis Larriba-Pey, Carl...
135
Voted
IH
2010
Springer
15 years 1 months ago
Short Collusion-Secure Fingerprint Codes against Three Pirates
In this article, we propose a new construction of probabilistic collusion-secure fingerprint codes against up to three pirates and give a theoretical security evaluation. Our pira...
Koji Nuida
146
Voted
SC
1990
ACM
15 years 7 months ago
Tracing application program execution on the Cray X-MP and Cray 2
Important insights into program operation can be gained by observing dynamic execution behavior. Unfortunately, many high-performance machines provide execution profile summaries ...
Allen D. Malony, John L. Larson, Daniel A. Reed