Sciweavers

213 search results - page 27 / 43
» On the Many Faces of Block Codes
Sort
View
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
13 years 11 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
STVR
2002
111views more  STVR 2002»
13 years 7 months ago
Can fault-exposure-potential estimates improve the fault detection abilities of test suites?
Code-coverage-based test data adequacy criteria typically treat all coverable code elements (such as statements, basic blocks, or outcomes of decisions) as equal. In practice, how...
Wei Chen, Roland H. Untch, Gregg Rothermel, Sebast...
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
14 years 2 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
CGO
2007
IEEE
14 years 1 months ago
Evaluating Indirect Branch Handling Mechanisms in Software Dynamic Translation Systems
Software Dynamic Translation (SDT) systems are used for program instrumentation, dynamic optimization, security, intrusion detection, and many other uses. As noted by many researc...
Jason Hiser, Daniel Williams, Wei Hu, Jack W. Davi...
GLOBECOM
2010
IEEE
13 years 5 months ago
Peer-to-Peer Storage Systems: A Practical Guideline to be Lazy
Distributed and peer-to-peer storage systems are foreseen as an alternative to the traditional data centers and in-house backup solutions. In the past few years many peerto-peer st...
Frédéric Giroire, Julian Monteiro, S...