Sciweavers

913 search results - page 129 / 183
» Full Abstraction for Linda
Sort
View
WRLA
2010
14 years 10 months ago
Folding Variant Narrowing and Optimal Variant Termination
Abstract. If a set of equations E∪Ax is such that E is confluent, terminating, and coherent modulo Ax, narrowing with E modulo Ax provides a complete E∪Ax-unification algorit...
Santiago Escobar, Ralf Sasse, José Meseguer
BIOCOMP
2010
14 years 10 months ago
A Model Reduction Technique for Stochastic Biochemical Kinetics
Abstract-- Modeling the intermolecular reactions in a single cell is a critical problem in computational biology. Biochemical reaction systems often involve species in both low and...
Silvana Ilie, Ekaterina Kudashkina
CANS
2010
Springer
258views Cryptology» more  CANS 2010»
14 years 10 months ago
Cryptanalysis of Reduced-Round MIBS Block Cipher
Abstract. This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at ...
Asli Bay, Jorge Nakahara, Serge Vaudenay
FPL
2010
Springer
129views Hardware» more  FPL 2010»
14 years 9 months ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
GLOBECOM
2010
IEEE
14 years 9 months ago
Space-Time Network Codes Utilizing Transform-Based Coding
Abstract-- Cooperative communications can be used to improve communication reliability. However, the transmissions from different relaying nodes result in a great challenge in prac...
Hung-Quoc Lai, Zhenzhen Gao, K. J. Ray Liu