Sciweavers

224 search results - page 45 / 45
» Transformations between Cryptographic Protocols
Sort
View
ASE
2004
137views more  ASE 2004»
13 years 5 months ago
Automatically Restructuring Programs for the Web
The construction of interactive server-side Web applications differs substantially from the construction of traditional interactive programs. In contrast, existing Web programming...
Jacob Matthews, Robert Bruce Findler, Paul T. Grau...
VTC
2010
IEEE
136views Communications» more  VTC 2010»
13 years 3 months ago
HARQ Aided Systematic LT Coding for Amplify-Forward and Decode-Forward Cooperation
—Systematic Luby Transform (SLT) codes constitute rateless codes, which are capable of adaptively adjusting their code rate depending on the channel quality without explicit chan...
Hoang Anh Ngo, Thanh Dang Nguyen, Lajos Hanzo
TACAS
2010
Springer
170views Algorithms» more  TACAS 2010»
13 years 3 months ago
SLAB: A Certifying Model Checker for Infinite-State Concurrent Systems
Systems and protocols combining concurrency and infinite state space occur quite often in practice, but are very difficult to verify automatically. At the same time, if the system ...
Klaus Dräger, Andrey Kupriyanov, Bernd Finkbe...
BMCBI
2011
13 years 17 days ago
GCOD - GeneChip Oncology Database
Background: DNA microarrays have become a nearly ubiquitous tool for the study of human disease, and nowhere is this more true than in cancer. With hundreds of studies and thousan...
Fenglong Liu, Joseph White, Corina Antonescu, John...