Sciweavers

252 search results - page 42 / 51
» Practical Data-Hiding: Additive Attacks Performance Analysis
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Near-Optimal Power Control in Wireless Networks: A Potential Game Approach
—We study power control in a multi-cell CDMA wireless system whereby self-interested users share a common spectrum and interfere with each other. Our objective is to design a pow...
Ozan Candogan, Ishai Menache, Asuman E. Ozdaglar, ...
SIGMETRICS
2010
ACM
146views Hardware» more  SIGMETRICS 2010»
13 years 3 months ago
In-degree dynamics of large-scale P2P systems
This paper builds a complete modeling framework for understanding user churn and in-degree dynamics in unstructured P2P systems in which each user can be viewed as a stationary al...
Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov
PLDI
2010
ACM
14 years 1 months ago
Mixing type checking and symbolic execution
Static analysis designers must carefully balance precision and efficiency. In our experience, many static analysis tools are built around an elegant, core algorithm, but that alg...
Yit Phang Khoo, Bor-Yuh Evan Chang, Jeffrey S. Fos...
BMCBI
2002
131views more  BMCBI 2002»
13 years 8 months ago
Efficient Boolean implementation of universal sequence maps (bUSM)
Background: Recently, Almeida and Vinga offered a new approach for the representation of arbitrary discrete sequences, referred to as Universal Sequence Maps (USM), and discussed ...
John Schwacke, Jonas S. Almeida
CCS
2003
ACM
14 years 1 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson