Sciweavers

1511 search results - page 295 / 303
» On the effectiveness of address-space randomization
Sort
View
JAR
2000
145views more  JAR 2000»
13 years 7 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
BC
1998
118views more  BC 1998»
13 years 7 months ago
A cross-interval spike train analysis: the correlation between spike generation and temporal integration of doublets
Abstract. A stochastic spike train analysis technique is introduced to reveal the correlation between the firing of the next spike and the temporal integration period of two conse...
David C. Tam
SAC
2002
ACM
13 years 7 months ago
A mobility and traffic generation framework for modeling and simulating ad hoc communication networks
We present a generic mobility and traffic generation framework that can be incorporated into a tool for modeling and simulating large scale ad hoc networks. Three components of thi...
Christopher L. Barrett, Madhav V. Marathe, James P...
TIT
2002
118views more  TIT 2002»
13 years 7 months ago
Cayley differential unitary space - Time codes
One method for communicating with multiple antennas is to encode the transmitted data differentially using unitary matrices at the transmitter, and to decode differentially withou...
Babak Hassibi, Bertrand M. Hochwald
NETWORK
2007
234views more  NETWORK 2007»
13 years 7 months ago
Surveillance Wireless Sensor Networks: Deployment Quality Analysis
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...