Sciweavers

1485 search results - page 71 / 297
» Whole Program Paths
Sort
View
WIDM
2004
ACM
14 years 3 months ago
XPath lookup queries in P2P networks
We address the problem of querying XML data over a P2P network. In P2P networks, the allowed kinds of queries are usually exact-match queries over file names. We discuss the exte...
Angela Bonifati, Ugo Matrangolo, Alfredo Cuzzocrea...
CCS
2007
ACM
14 years 1 months ago
Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach
Defending against denial-of-service (DoS) in a mobile ad hoc network (MANET) is challenging because the network topology is dynamic and nodes are selfish. In this paper, we propos...
Xiaoxin Wu, David K. Y. Yau
CORR
2010
Springer
174views Education» more  CORR 2010»
13 years 9 months ago
Gaussian Process Bandits for Tree Search
We motivate and analyse a new Tree Search algorithm, based on recent advances in the use of Gaussian Processes for bandit problems. We assume that the function to maximise on the ...
Louis Dorard, John Shawe-Taylor
JCST
2007
97views more  JCST 2007»
13 years 9 months ago
Improved Collision Attack on Hash Function MD5
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. The algorithm is based on the two-block collision differential path of MD5 that ...
Jie Liang, Xue-Jia Lai
ISORC
2006
IEEE
14 years 3 months ago
JAAT: Java Alias Analysis Tool for Program Maintenance Activities
Alias analysis is a method for extracting sets of expressions which may possibly refer to the same memory locations during program execution. Although many researchers have alread...
Fumiaki Ohata, Katsuro Inoue