Sciweavers

1054 search results - page 192 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
AAAI
2010
14 years 12 months ago
Computing Cost-Optimal Definitely Discriminating Tests
The goal of testing is to discriminate between multiple hypotheses about a system--for example, different fault diagnoses--by applying input patterns and verifying or falsifying t...
Anika Schumann, Jinbo Huang, Martin Sachenbacher
96
Voted
BMCBI
2010
153views more  BMCBI 2010»
14 years 12 months ago
PPLook: an automated data mining tool for protein-protein interaction
Background: Extracting and visualizing of protein-protein interaction (PPI) from text literatures are a meaningful topic in protein science. It assists the identification of inter...
Shao-Wu Zhang, Yao-Jun Li, Li Xia, Quan Pan
IACR
2011
89views more  IACR 2011»
13 years 11 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
MM
2005
ACM
219views Multimedia» more  MM 2005»
15 years 5 months ago
Pervasive views: area exploration and guidance using extended image media
This work achieves full registration of scenes in a large area and creates visual indexes for visualization in a digital city. We explore effective mapping, indexing, and display ...
Jiang Yu Zheng, Xiaolong Wang
CMS
2003
171views Communications» more  CMS 2003»
15 years 1 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent