Sciweavers

7623 search results - page 1328 / 1525
» Constructive Volume Modeling
Sort
View
ISMB
2007
15 years 6 months ago
Computational prediction of host-pathogen protein-protein interactions
Our major effort in this reporting period comprised functional genomic studies of key genes for carbon metabolite and nodulation/nitrogen fixation in Sinorhizobium meliloti, compar...
Matthew D. Dyer, T. M. Murali, Bruno W. S. Sobral
AFRICACRYPT
2008
Springer
15 years 5 months ago
How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?
Abstract. In the context of iterated hash functions, "dithering" designates the technique of adding an iteration-dependent input to the compression function in order to d...
Jean-Philippe Aumasson, Raphael C.-W. Phan
APLAS
2008
ACM
15 years 5 months ago
Context-Sensitive Relevancy Analysis for Efficient Symbolic Execution
Abstract. Symbolic execution is a flexible and powerful, but computationally expensive technique to detect dynamic behaviors of a program. In this paper, we present a context-sensi...
Xin Li, Daryl Shannon, Indradeep Ghosh, Mizuhito O...
135
Voted
ASPDAC
2008
ACM
104views Hardware» more  ASPDAC 2008»
15 years 5 months ago
Low power clock buffer planning methodology in F-D placement for large scale circuit design
Traditionally, clock network layout is performed after cell placement. Such methodology is facing a serious problem in nanometer IC designs where people tend to use huge clock buff...
Yanfeng Wang, Qiang Zhou, Yici Cai, Jiang Hu, Xian...
ATAL
2008
Springer
15 years 5 months ago
Specifying and enforcing norms in artificial institutions
In this paper we investigate two related aspects of the formalization of open interaction systems: how to specify norms, and how to enforce them by means of sanctions. The problem...
Nicoletta Fornara, Marco Colombetti
« Prev « First page 1328 / 1525 Last » Next »