Sciweavers

411 search results - page 66 / 83
» Algebraic Imperative Specifications
Sort
View
FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 5 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
BMCBI
2010
165views more  BMCBI 2010»
15 years 2 months ago
MTar: a computational microRNA target prediction architecture for human transcriptome
Background: MicroRNAs (miRNAs) play an essential task in gene regulatory networks by inhibiting the expression of target mRNAs. As their mRNA targets are genes involved in importa...
Vinod Chandra, Reshmi Girijadevi, Achuthsankar S. ...
FOCS
2007
IEEE
15 years 8 months ago
On the Complexity of Nash Equilibria and Other Fixed Points (Extended Abstract)
d Abstract) Kousha Etessami LFCS, School of Informatics University of Edinburgh Mihalis Yannakakis Department of Computer Science Columbia University We reexamine what it means to...
Kousha Etessami, Mihalis Yannakakis
FOSSACS
2005
Springer
15 years 7 months ago
Mathematical Models of Computational and Combinatorial Structures
The general aim of this talk is to advocate a combinatorial perspective, together with its methods, in the investigation and study of models of computation structures. This, of cou...
Marcelo P. Fiore
MMMACNS
2005
Springer
15 years 7 months ago
Networks, Markov Lie Monoids, and Generalized Entropy
The continuous general linear group in n dimensions can be decomposed into two Lie groups: (1) an n(n-1) dimensional ‘Markov type’ Lie group that is defined by preserving the ...
Joseph E. Johnson