Sciweavers

2060 search results - page 311 / 412
» Some Applications of Coding Theory in Computational Complexi...
Sort
View
CF
2007
ACM
15 years 8 months ago
Identifying potential parallelism via loop-centric profiling
The transition to multithreaded, multi-core designs places a greater responsibility on programmers and software for improving performance; thread-level parallelism (TLP) will be i...
Tipp Moseley, Daniel A. Connors, Dirk Grunwald, Ra...
SFP
2004
15 years 5 months ago
A graphic functional-dataflow language
NiMo (Nets in Motion) is a visual environment aimed to support totally graphic programming in Data Flow style, with a strong functional inspiration. Solutions of growing complexit...
Silvia Clerici, Cristina Zoltan
147
Voted
ICASSP
2010
IEEE
15 years 4 months ago
A novel watermarking scheme with compensation in bit-stream domain for H.264/AVC
Currently, most of the watermarking algorithms for H.264/AVC video coding standard are encoder-based due to their high perceptual quality. However, for the compressed video, they ...
Liwei Zhang, Yuesheng Zhu, Lai-Man Po
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 8 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
RAID
2005
Springer
15 years 9 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe