Sciweavers

103 search results - page 18 / 21
» Constructing malware normalizers using term rewriting
Sort
View
ICFP
2010
ACM
14 years 9 months ago
Lolliproc: to concurrency from classical linear logic via curry-howard and control
While many type systems based on the intuitionistic fragment of linear logic have been proposed, applications in programming languages of the full power of linear logic--including...
Karl Mazurak, Steve Zdancewic
CHI
1995
ACM
15 years 1 months ago
The ScienceWare Modeler: a learner-centered tool for students building models
The Modeler is designed using a learner-centered approach [5], with scaffolding to address the specific needs of learners. Scaffolding [3] is an educational term that refers to pro...
Shari L. Jackson
BMCBI
2006
163views more  BMCBI 2006»
14 years 9 months ago
Ensemble attribute profile clustering: discovering and characterizing groups of genes with similar patterns of biological featur
Background: Ensemble attribute profile clustering is a novel, text-based strategy for analyzing a userdefined list of genes and/or proteins. The strategy exploits annotation data ...
J. R. Semeiks, A. Rizki, Mina J. Bissell, I. Saira...
BMCBI
2007
135views more  BMCBI 2007»
14 years 9 months ago
Sequence similarity is more relevant than species specificity in probabilistic backtranslation
Background: Backtranslation is the process of decoding a sequence of amino acids into the corresponding codons. All synthetic gene design systems include a backtranslation module....
Alfredo Ferro, Rosalba Giugno, Giuseppe Pigola, Al...
ISW
2004
Springer
15 years 2 months ago
Low-Level Ideal Signatures and General Integrity Idealization
Abstract. Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protoco...
Michael Backes, Birgit Pfitzmann, Michael Waidner