Sciweavers

165 search results - page 33 / 33
» Safety-Liveness Exclusion in Distributed Computing
Sort
View
CCS
2008
ACM
13 years 6 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
DIMEA
2007
132views Multimedia» more  DIMEA 2007»
13 years 6 months ago
On the production of creative subjectivity
Businesses today are requiring higher levels of creativity and innovation in the face of rapid change, fierce competition and increasingly complex markets. Nowhere is the more obv...
Brett Rolfe
ALMOB
2008
85views more  ALMOB 2008»
13 years 4 months ago
Noisy: Identification of problematic columns in multiple sequence alignments
Motivation: Sequence-based methods for phylogenetic reconstruction from (nucleic acid) sequence data are notoriously plagued by two effects: homoplasies and alignment errors. Larg...
Andreas W. M. Dress, Christoph Flamm, Guido Fritzs...
JFP
2008
72views more  JFP 2008»
13 years 4 months ago
Dynamic rebinding for marshalling and update, via redex-time and destruct-time reduction
Most programming languages adopt static binding, but for distributed programming an exclusive reliance on static binding is too restrictive: dynamic binding is required in various...
Peter Sewell, Gareth Stoyle, Michael Hicks, Gavin ...
BMCBI
2005
67views more  BMCBI 2005»
13 years 4 months ago
Sequence signature analysis of chromosome identity in three Drosophila species
Background: All eukaryotic organisms need to distinguish each of their chromosomes. A few protein complexes have been described that recognise entire, specific chromosomes, for in...
Per Stenberg, Fredrik Pettersson, Anja O. Saura, A...