Sciweavers

758 search results - page 129 / 152
» Timing Analysis of Optimised Code
Sort
View
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
14 years 2 months ago
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
We consider the following problem: how can two devices that do not share any secrets establish a shared secret key over a wireless radio channel in the presence of a communication...
Mario Strasser, Christina Pöpper, Srdjan Capk...
VTC
2008
IEEE
14 years 2 months ago
High Rate Two-Way Amplify-and-Forward Half-Duplex Relaying with OSTBC
—In this paper, we derive tight upper and lower bounds for the average sum rate of two-way amplify-andforward (AF) half-duplex relaying, which show that two-way AF half-duplex re...
Yang Han, See Ho Ting, Chin Keong Ho, Woon Hau Chi...
AVSS
2007
IEEE
14 years 2 months ago
Detecting shopper groups in video sequences
We present a generalized extensible framework for automated recognition of swarming activities in video sequences. The trajectory of each individual is produced by the visual trac...
Alex Leykin, Mihran Tuceryan
DSN
2007
IEEE
14 years 2 months ago
Failure Resilience for Device Drivers
Studies have shown that device drivers and extensions contain 3–7 times more bugs than other operating system code and thus are more likely to fail. Therefore, we present a fail...
Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Ho...
ICSM
2007
IEEE
14 years 1 months ago
On the prediction of the evolution of libre software projects
Libre (free / open source) software development is a complex phenomenon. Many actors (core developers, casual contributors, bug reporters, patch submitters, users, etc.), in many ...
Israel Herraiz, Jesús M. González-Ba...