Sciweavers

1816 search results - page 310 / 364
» Case study in modeling and simulation validation methodology
Sort
View
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
15 years 10 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
ISSRE
2000
IEEE
15 years 2 months ago
Building Trust into OO Components Using a Genetic Analogy
Despite the growing interest for component-based systems, few works tackle the question of the trust we can bring into a component. This paper presents a method and a tool for bui...
Benoit Baudry, Vu Le Hanh, Jean-Marc Jéz&ea...
ICFP
2009
ACM
15 years 10 months ago
Causal commutative arrows and their optimization
re a popular form of abstract computation. Being more general than monads, they are more broadly applicable, and in parare a good abstraction for signal processing and dataflow co...
Hai Liu, Eric Cheng, Paul Hudak
BMCBI
2010
147views more  BMCBI 2010»
14 years 9 months ago
Learning biological network using mutual information and conditional independence
Background: Biological networks offer us a new way to investigate the interactions among different components and address the biological system as a whole. In this paper, a revers...
Dong-Chul Kim, Xiaoyu Wang, Chin-Rang Yang, Jean G...
CDC
2008
IEEE
151views Control Systems» more  CDC 2008»
15 years 4 months ago
Analysis of hybrid systems resulting from relay-type hysteresis and saturation: A Lyapunov approach
— This paper studies a class of hybrid systems with linear (or linear plus saturated linear) continuous and discrete dynamics, which are determined by a flow map and jump map, a...
Dan Dai, Ricardo G. Sanfelice, Tingshu Hu, Andrew ...