Sciweavers

1010 search results - page 93 / 202
» Designing Then and Now
Sort
View
ISCI
2008
86views more  ISCI 2008»
14 years 11 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...
DEBU
2007
131views more  DEBU 2007»
14 years 11 months ago
Future Trends in Secure Chip Data Management
Secure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous in applications with strong security requirements. Secure chips host personal data that must be care...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
ML
2008
ACM
109views Machine Learning» more  ML 2008»
14 years 11 months ago
O'browser: objective caml on browsers
We present a way to run Objective Caml programs on a standard, unmodified web browser, with a compatible data representation and execution model, including concurrency. To achieve...
Benjamin Canou, Vincent Balat, Emmanuel Chailloux
NAR
2006
81views more  NAR 2006»
14 years 11 months ago
Visualizing syntenic relationships among the hemiascomycetes with the Yeast Gene Order Browser
The Yeast Gene Order Browser (YGOB) is an online tool designed to facilitate the comparative genomic visualization and appraisal of synteny within and between the genomes of seven...
Kevin P. Byrne, Kenneth H. Wolfe
JAL
2002
71views more  JAL 2002»
14 years 11 months ago
A primal-dual schema based approximation algorithm for the element connectivity problem
The element connectivity problem falls in the category of survivable network design problems { it is intermediate to the versions that ask for edge-disjoint and vertex-disjoint pa...
Kamal Jain, Ion I. Mandoiu, Vijay V. Vazirani, Dav...