Sciweavers

46 search results - page 8 / 10
» Divisible designs from twisted dual numbers
Sort
View
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 3 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
15 years 1 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
BMCBI
2007
94views more  BMCBI 2007»
14 years 9 months ago
A structural analysis of in vitro catalytic activities of hammerhead ribozymes
Background: Ribozymes are small catalytic RNAs that possess the dual functions of sequencespecific RNA recognition and site-specific cleavage. Trans-cleaving ribozymes can inhibit...
Yu Shao, Susan Wu, Chi Yu Chan, Jessie R. Klapper,...
CADE
2007
Springer
15 years 10 months ago
MaLARea: a Metasystem for Automated Reasoning in Large Theories
MaLARea (a Machine Learner for Automated Reasoning) is a simple metasystem iteratively combining deductive Automated Reasoning tools (now the E and the SPASS ATP systems) with a m...
Josef Urban
CAV
1998
Springer
175views Hardware» more  CAV 1998»
15 years 2 months ago
An ACL2 Proof of Write Invalidate Cache Coherence
As a pedagogical exercise in ACL2, we formalize and prove the correctness of a write invalidate cache scheme. In our formalization, an arbitrary number of processors, each with its...
J. Strother Moore