Sciweavers

46 search results - page 8 / 10
» Divisible designs from twisted dual numbers
Sort
View
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
13 years 12 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
13 years 9 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
BMCBI
2007
94views more  BMCBI 2007»
13 years 5 months ago
A structural analysis of in vitro catalytic activities of hammerhead ribozymes
Background: Ribozymes are small catalytic RNAs that possess the dual functions of sequencespecific RNA recognition and site-specific cleavage. Trans-cleaving ribozymes can inhibit...
Yu Shao, Susan Wu, Chi Yu Chan, Jessie R. Klapper,...
CADE
2007
Springer
14 years 6 months ago
MaLARea: a Metasystem for Automated Reasoning in Large Theories
MaLARea (a Machine Learner for Automated Reasoning) is a simple metasystem iteratively combining deductive Automated Reasoning tools (now the E and the SPASS ATP systems) with a m...
Josef Urban
CAV
1998
Springer
175views Hardware» more  CAV 1998»
13 years 10 months ago
An ACL2 Proof of Write Invalidate Cache Coherence
As a pedagogical exercise in ACL2, we formalize and prove the correctness of a write invalidate cache scheme. In our formalization, an arbitrary number of processors, each with its...
J. Strother Moore