Sciweavers

32 search results - page 4 / 7
» sp 1997
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
13 years 11 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
EOR
2007
104views more  EOR 2007»
13 years 7 months ago
A cutting-plane approach for the two-dimensional orthogonal non-guillotine cutting problem
The two-dimensional orthogonal non-guillotine cutting problem (NGCP) appears in many industries (like wood and steel industries) and consists in cutting a rectangular master surfa...
Roberto Baldacci, Marco A. Boschetti
KBSE
1997
IEEE
13 years 11 months ago
A Formal Automated Approach for Reverse Engineering Programs with Pointers
Given a program S and a precondition Q, the strongest postcondition, denoted sp(S Q), is defined as the strongest condition that holds after the execution of S, given that S term...
Gerald C. Gannod, Betty H. C. Cheng
HPCN
1997
Springer
13 years 11 months ago
Evaluation of High Performance Fortran Through Application Kernels
Since the de nition of the High Performance Fortran HPF standard, we have been maintaining a suite of application kernel codes with the aim of using them to evaluate the availabl...
H. W. Yau, Geoffrey Fox, Kenneth A. Hawick
SPAA
1997
ACM
13 years 11 months ago
HARP: A Fast Spectral Partitioner
- Partitioning unstructured graphs is central to the parallel solution of computational science and engineering problems. Spectral partitioners, such recursive spectral bisection (...
Horst D. Simon, Andrew Sohn, Rupak Biswas