Sciweavers

620 search results - page 124 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
TCS
2002
13 years 4 months ago
A unified language processing methodology
This paper discusses a mathematical concept of language that models both artificial and natural languages and thus provides a framework for a unified language processing methodolo...
Teodor Rus
JCC
2010
103views more  JCC 2010»
13 years 3 months ago
Conformational behavior of simple furanosides studied by optical rotation
: Experimental and theoretical specific optical rotations (OR) of anhydro, epithio, and epiminoderivatives of methyl tetrofuranosides in chloroform solutions have been compared an...
Jakub Kaminský, Ivan Raich, Katerina Tomc&a...
IEEESCC
2009
IEEE
13 years 3 months ago
QoS-Enabled Business-to-Business Integration Using ebBP to WS-BPEL Translations
Business-To-Business Integration (B2Bi) is a key mechanism for enterprises to gain competitive advantage. However, developing B2Bi applications is far from trivial. Inter alia, ag...
Andreas Schönberger, Thomas Benker, Stefan Fr...
INFSOF
2010
173views more  INFSOF 2010»
13 years 2 months ago
Filtering false alarms of buffer overflow analysis using SMT solvers
Buffer overflow detection using static analysis can provide a powerful tool for software ers to find difficult bugs in C programs. Sound static analysis based on abstract interpre...
Youil Kim, Jooyong Lee, Hwansoo Han, Kwang-Moo Cho...
SIAMCOMP
2002
138views more  SIAMCOMP 2002»
13 years 4 months ago
Phase Change of Limit Laws in the Quicksort Recurrence under Varying Toll Functions
We characterize all limit laws of the quicksort type random variables defined recursively by Xn d = XIn + X n-1-In + Tn when the "toll function" Tn varies and satisfies ...
Hsien-Kuei Hwang, Ralph Neininger