Sciweavers

671 search results - page 95 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
EUROSYS
2007
ACM
15 years 8 months ago
Melange: creating a "functional" internet
Most implementations of critical Internet protocols are written in type-unsafe languages such as C or C++ and are regularly vulnerable to serious security and reliability problems...
Anil Madhavapeddy, Alex Ho, Tim Deegan, David Scot...
86
Voted
CSFW
2008
IEEE
15 years 6 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal
BIOINFORMATICS
2005
61views more  BIOINFORMATICS 2005»
14 years 11 months ago
Identification and measurement of neighbor-dependent nucleotide substitution processes
Abstract: The presence of different neighbor dependent substitution processes generates specific patterns of dinucleotide frequencies in all organisms. Based on a general framework...
Peter F. Arndt, Terence Hwa
DSD
2004
IEEE
129views Hardware» more  DSD 2004»
15 years 3 months ago
Functional Validation of Programmable Architectures
Validation of programmable architectures, consisting of processor cores, coprocessors, and memory subsystems, is one of the major bottlenecks in current Systemon-Chip design metho...
Prabhat Mishra, Nikil D. Dutt
HPCA
2008
IEEE
16 years 4 days ago
Automated microprocessor stressmark generation
Estimating the maximum power and thermal characteristics of a processor is essential for designing its power delivery system, packaging, cooling, and power/thermal management sche...
Ajay M. Joshi, Lieven Eeckhout, Lizy Kurian John, ...