Sciweavers

27692 search results - page 50 / 5539
» Where is ...
Sort
View
ACSAC
2004
IEEE
14 years 15 days ago
A Look Back at "Security Problems in the TCP/IP Protocol Suite"
About fifteen years ago, I wrote a paper on security problems in the TCP/IP protocol suite, In particular, I focused on protocol-level issues, rather than implementation flaws. It...
Steven M. Bellovin
CAV
2008
Springer
89views Hardware» more  CAV 2008»
13 years 10 months ago
Inferring Congruence Equations Using SAT
This paper proposes a new approach for deriving invariants that are systems of congruence equations where the modulo is a power of 2. The technique is an amalgam of SAT-solving, wh...
Andy King, Harald Søndergaard
APAL
2008
104views more  APAL 2008»
13 years 9 months ago
Atomic models higher up
There exists a countable structure M of Scott rank CK 1 where M 1 = CK 1 and where the LCK 1 ,-theory of M is not -categorical. The Scott rank of a model is the least ordinal whe...
Jessica Millar, Gerald E. Sacks
IPL
2006
98views more  IPL 2006»
13 years 8 months ago
Transforming spanning trees and pseudo-triangulations
Let TS be the set of all crossing-free straight line spanning trees of a planar n-point set S. Consider the graph TS where two members T and T of TS are adjacent if T intersects T...
Oswin Aichholzer, Franz Aurenhammer, Clemens Hueme...
CORR
2010
Springer
77views Education» more  CORR 2010»
13 years 8 months ago
The Binary-Symmetric Parallel-Relay Network
We present capacity results of the binary-symmetric parallel-relay network, where there is one source, one destination, and K relays in parallel. We show that forwarding relays, wh...
Lawrence Ong, Sarah J. Johnson, Christopher M. Kel...