Sciweavers

988 search results - page 139 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
IEEEARES
2008
IEEE
14 years 3 months ago
A Lightweight Security Analyzer inside GCC
This paper describes the design and implementation of a lightweight static security analyzer that exploits the compilation process of the gcc compiler. The tool is aimed at giving...
Davide Pozza, Riccardo Sisto
IEEEARES
2008
IEEE
14 years 3 months ago
Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System
Recommender systems enable merchants to assist customers in finding products that best satisfy their needs. Unfortunately, current recommender systems suffer from various privacy...
Esma Aïmeur, Gilles Brassard, José Man...
INFOCOM
2008
IEEE
14 years 3 months ago
Cross-Monotonic Multicast
—In the routing and cost sharing of multicast towards a group of potential receivers, cross-monotonicity is a property that states a user’s payment can only be smaller when ser...
Zongpeng Li
INFOCOM
2008
IEEE
14 years 3 months ago
Diagnosing Wireless Packet Losses in 802.11: Separating Collision from Weak Signal
—It is well known that a packet loss in 802.11 can happen either due to collision or an insufficiently strong signal. However, discerning the exact cause of a packet loss, once ...
Shravan K. Rayanchu, Arunesh Mishra, Dheeraj Agraw...
INFOCOM
2008
IEEE
14 years 3 months ago
Underwater Localization in Sparse 3D Acoustic Sensor Networks
—We study the localization problem in sparse 3D underwater sensor networks. Considering the fact that depth information is typically available for underwater sensors, we transfor...
Wei Cheng, Amin Y. Teymorian, Liran Ma, Xiuzhen Ch...