Sciweavers

2841 search results - page 46 / 569
» A Call to Order
Sort
View
JCB
2008
102views more  JCB 2008»
14 years 9 months ago
DUPCAR: Reconstructing Contiguous Ancestral Regions with Duplications
Accurately reconstructing the large-scale gene order in an ancestral genome is a critical step to better understand genome evolution. In this paper, we propose a heuristic algorit...
Jian Ma, Aakrosh Ratan, Brian J. Raney, Bernard B....
DAGSTUHL
2006
14 years 11 months ago
The complexity of Boolean functions from cryptographic viewpoint
Cryptographic Boolean functions must be complex to satisfy Shannon's principle of confusion. But the cryptographic viewpoint on complexity is not the same as in circuit compl...
Claude Carlet
GLOBECOM
2010
IEEE
14 years 7 months ago
Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks
Primary user emulation attack (PUEA) is a denial of service (DoS) attack unique to dynamic spectrum access (DSA) networks. While there have been studies in the literature to detect...
Z. Jin, S. Anand, K. P. Subbalakshmi
EUROCRYPT
2003
Springer
15 years 3 months ago
On the Security of RDSA
A variant of Schnorr’s signature scheme called RDSA has been proposed by I. Biehl, J. Buchmann, S. Hamdy and A. Meyer in order to be used in finite abelian groups of unknown ord...
Pierre-Alain Fouque, Guillaume Poupard
SYNTHESE
2008
71views more  SYNTHESE 2008»
14 years 9 months ago
Formalizing common sense: an operator-based approach to the Tibbles-Tib problem
The paper argues, that a direct formalization of the way common sense thinks about the numerical identity of enduring entities, requires that traditional predicate logic is develo...
Ingvar Johansson