Sciweavers

5864 search results - page 173 / 1173
» Can We Work around Numerical Methods
Sort
View
FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 8 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
119
Voted
AIPS
2004
15 years 6 months ago
Task Swapping for Schedule Improvement: A Broader Analysis
In this paper we analyze and extend a recently developed "task-swapping procedure" for improving schedules in oversubscribed situations. In such situations, there are ta...
Laurence A. Kramer, Stephen F. Smith
MICCAI
2005
Springer
16 years 5 months ago
Segmentation and 3D Reconstruction of Microtubules in Total Internal Reflection Fluorescence Microscopy (TIRFM)
The interaction of the microtubules with the cell cortex plays numerous critical roles in a cell. For instance, it directs vesicle delivery, and modulates membrane adhesions pivota...
Stathis Hadjidemetriou, Derek Toomre, James S. Dun...
124
Voted
SEMWEB
2004
Springer
15 years 10 months ago
An Initial Investigation into Querying an Untrustworthy and Inconsistent Web
The Semantic Web is bound to be untrustworthy and inconsistent. In this paper, we present an initial approach for obtaining useful information in such an environment. In particular...
Yuanbo Guo, Jeff Heflin
HPCC
2007
Springer
15 years 10 months ago
FROCM: A Fair and Low-Overhead Method in SMT Processor
Simultaneous Multithreading (SMT)[1][2] and chip multiprocessors (CMP) processors [3] have emerged as the mainstream computing platform in major market segments, including PC, serv...
Shuming Chen, Pengyong Ma