Sciweavers

1511 search results - page 72 / 303
» On the effectiveness of address-space randomization
Sort
View
CHES
1999
Springer
133views Cryptology» more  CHES 1999»
14 years 4 days ago
Random Number Generators Founded on Signal and Information Theory
The strength of a cryptographic function depends on the amount of entropy in the cryptovariables that are used as keys. Using a large key length with a strong algorithm is false co...
David Paul Maher, Robert J. Rance
CORR
2010
Springer
177views Education» more  CORR 2010»
13 years 8 months ago
Supervised Random Walks: Predicting and Recommending Links in Social Networks
Predicting the occurrence of links is a fundamental problem in networks. In the link prediction problem we are given a snapshot of a network and would like to infer which interact...
Lars Backstrom, Jure Leskovec
IJCV
2008
157views more  IJCV 2008»
13 years 7 months ago
A General Method for Sensor Planning in Multi-Sensor Systems: Extension to Random Occlusion
Systems utilizing multiple sensors are required in many domains. In this paper, we specifically concern ourselves with applications where dynamic objects appear randomly and the s...
Anurag Mittal, Larry S. Davis
VTC
2010
IEEE
177views Communications» more  VTC 2010»
13 years 6 months ago
Randomized Robot-Assisted Relocation of Sensors for Coverage Repair in Wireless Sensor Networks
—In wireless sensor networks (WSN), stochastic node dropping and unpredictable node failure greatly impair coverage, creating sensing holes, while locally redundant sensors exist...
Greg Fletcher, Xu Li, Amiya Nayak, Ivan Stojmenovi...
VIS
2007
IEEE
101views Visualization» more  VIS 2007»
14 years 9 months ago
Random-Accessible Compressed Triangle Meshes
With the exponential growth in size of geometric data, it is becoming increasingly important to make effective use of multilevel caches, limited disk storage, and bandwidth. As a r...
Sung-Eui Yoon, Peter Lindstrom