Sciweavers

3820 search results - page 380 / 764
» Bounded Model Debugging
Sort
View
JCNS
2000
73views more  JCNS 2000»
15 years 4 months ago
Models of Calmodulin Trapping and CaM Kinase II Activation in a Dendritic Spine
Activation of calcium/calmodulin-dependent protein kinase II (CaMKII) by calmodulin following calcium entry into the cell is important for long-term potentiation (LTP). Here a mode...
William Holmes
TASE
2011
IEEE
14 years 8 months ago
Fast Intersection-Free Offset Surface Generation From Freeform Models With Triangular Meshes
Abstract—A fast offset surface generation approach is presented in this paper to construct intersection-free offset surfaces, which preserve sharp features, from freeform triangu...
Shengjun Liu, Charlie C. L. Wang
STOC
2005
ACM
132views Algorithms» more  STOC 2005»
16 years 4 months ago
Concurrent general composition of secure protocols in the timing model
In the setting of secure multiparty computation, a set of parties wish to to jointly compute some function of their input (i.e., they wish to securely carry out some distributed t...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...
TARK
2007
Springer
15 years 10 months ago
Knowledge-based modelling of voting protocols
We contend that reasoning about knowledge is both natural and pragmatic for verification of electronic voting protocols. We present a model in which desirable properties of elect...
A. Baskar, Ramaswamy Ramanujam, S. P. Suresh
CONEXT
2006
ACM
15 years 10 months ago
Modeling ping times in first person shooter games
In First Person Shooter (FPS) games the Round Trip Time (RTT), i.e., the sum of the network delay from client to server and the network delay from server to client, impacts the ga...
Natalie Degrande, Danny De Vleeschauwer, Robert E....