Sciweavers

811 search results - page 140 / 163
» Flow Theory: An Enhancement
Sort
View
CIIA
2009
15 years 26 days ago
LCF-style for Secure Verification Platform based on Multiway Decision Graphs
Abstract. Formal verification of digital systems is achieved, today, using one of two main approaches: states exploration (mainly model checking and equivalence checking) or deduct...
Sa'ed Abed, Otmane Aït Mohamed
88
Voted
CORR
2010
Springer
60views Education» more  CORR 2010»
14 years 12 months ago
A Novel Scheme for Secured Data Transfer Over Computer Networks
: This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a `jigsaw puzzle&#...
Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal
CORR
2010
Springer
135views Education» more  CORR 2010»
14 years 12 months ago
Optimal Design of a Molecular Recognizer: Molecular Recognition as a Bayesian Signal Detection Problem
Numerous biological functions--such as enzymatic catalysis, the immune response system, and the DNA-protein regulatory network--rely on the ability of molecules to specifically rec...
Yonatan Savir, Tsvi Tlusty
CORR
2008
Springer
137views Education» more  CORR 2008»
14 years 12 months ago
Combining generic judgments with recursive definitions
Many semantical aspects of programming languages are specified through calculi for constructing proofs: consider, for example, the specification of structured operational semantic...
Andrew Gacek, Dale Miller, Gopalan Nadathur
IJBC
2008
112views more  IJBC 2008»
14 years 11 months ago
Computation and Visualization of bifurcation Surfaces
The localization of critical parameter sets called bifurcations is often a central task of the analysis of a nonlinear dynamical system. Bifurcations of codimension 1 that can be ...
Dirk Stiefs, Thilo Gross, Ralf Steuer, Ulrike Feud...