Sciweavers

2223 search results - page 415 / 445
» Events in Property Patterns
Sort
View
119
Voted
FSTTCS
2003
Springer
15 years 7 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
VDA
2010
247views Visualization» more  VDA 2010»
15 years 4 months ago
Flow Web: a graph based user interface for 3D flow field exploration
While there have been intensive efforts in developing better 3D flow visualization techniques, little attention has been paid to the design of better user interfaces and more effe...
Lijie Xu, Han-Wei Shen
CIDR
2003
125views Algorithms» more  CIDR 2003»
15 years 3 months ago
Crossing the Structure Chasm
It has frequently been observed that most of the world’s data lies outside database systems. The reason is that database systems focus on structured data, leaving the unstructur...
Alon Y. Halevy, Oren Etzioni, AnHai Doan, Zachary ...
WORM
2004
15 years 3 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
BMCBI
2007
141views more  BMCBI 2007»
15 years 2 months ago
HeliCis: a DNA motif discovery tool for colocalized motif pairs with periodic spacing
Background: Correct temporal and spatial gene expression during metazoan development relies on combinatorial interactions between different transcription factors. As a consequence...
Erik Larsson, Per Lindahl, Petter Mostad