نتایج جستجو برای: chaff
تعداد نتایج: 571 فیلتر نتایج به سال:
Network-based intrusions have become a serious treat to the users of the Internet. To help cover their tracks, attackers launch attacks from a series of previously compromised systems called stepping stones. Timing correlations on incoming and outgoing packets can lead to detection of the stepping stone and can be used to trace the attacker through each link. Existing approaches, however, delib...
Modern Chaff-like SAT solvers enhance plain backtracking (DLL) by Conflict-Driven Learning (CDL), including 1UIP-based Conflict-Directed Backjumping (CDB), Non-Chronological Backtracking (NCB), and 1UIP-based Conflict-Clause Recording (CCR). We show how to add these enhancements step-by-step to plain DLL to derive Chaff’s Conflict-Driven Learning algorithm, separately and independently of BCP, ...
We describe here a fully portable, open source certifier for traces of SAT problems produced by zChaff [6]. It can also be easily adapted for MiniSat [4], PicoSat [2] and Booleforce, which we have done for PicoSat. Our certifier has been developped with the proof assistant Coq. We give some figures based on the pigeon hole, comparing both PicoSat and zChaff on the one hand, and our certifier wi...
In this paper we present a satisfiability-based approach to the scheduling problem in high-level synthesis. We formulate the resource constrained scheduling as a satisfiability (SAT) problem. We present experimental results on the performance of the state-of-the-art SAT solver, Chaff, and demonstrate techniques to reduce the SAT problem size by applying bounding techniques on the scheduling pro...
Chaff jamming is a widely used passive interference method. A chaff cloud diffusion model for the widespread was presented. The high-density aerodynamic can rapidly predict elements’ time-varying spatial orientation, location, and overall distribution. Basing on these pieces of information, radar cross section (RCS) single fibre be obtained based method moments (MoM). For clouds, attenuation sh...
1. Sheep fed on a maintenance ration of wheaten-hay chaff or of wheaten-hay chaff-lucerne-hay chaff (I : I, W/W) became deficient or incipiently deficient in vitamin E. 2. Degenerative changes were observed in bone marrow and muscle, and liver function was imparied in some animals. These abnormalities were not influenced by the vitamin B12 status of the animals or by a shortage of cobalt in the...
This paper presents a novel approach to remotely authenticating a user by applying the Vaulted Fingerprint Verification (VFV) protocol. It proposes an adaptation of the Vaulted Verification (VV) concept with fingerprint minutia triangle representation. Over the past decade, triangle features have been used in multiple fingerprint algorithms. Triangles are constructed from three fingerprint minu...
Fuzzy vault is a well-known technique to address the privacy concerns in biometric identification applications. We revisit the fuzzy vault scheme to address implementation, efficiency, and security issues encountered in its realization. We use the fingerprint data as a case study. We compare the performances of two different methods used in the implementation of fuzzy vault, namely brute force ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید