Sciweavers

891 search results - page 13 / 179
» Full Abstraction for PCF
Sort
View
103
Voted
FSE
2006
Springer
114views Cryptology» more  FSE 2006»
15 years 5 months ago
Cryptanalysis of the Full HAVAL with 4 and 5 Passes
Abstract. HAVAL is a cryptographic hash function with variable digest size proposed by Zheng, Pieprzyk and Seberry in 1992. It has three variants, 3-, 4-, and 5-pass HAVAL. Previou...
Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park
115
Voted
EVOW
2008
Springer
15 years 3 months ago
DEEPER: A Full Parsing Based Approach to Protein Relation Extraction
Abstract. Lexical variance in biomedical texts poses a challenge to automatic protein relation mining. We therefore propose a new approach that relies only on more general language...
Timur Fayruzov, Martine De Cock, Chris Cornelis, V...
IJISEC
2006
108views more  IJISEC 2006»
15 years 1 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
122
Voted
ASPLOS
2008
ACM
15 years 3 months ago
Understanding and visualizing full systems with data flow tomography
It is not uncommon for modern systems to be composed of a variety of interacting services, running across multiple machines in such a way that most developers do not really unders...
Shashidhar Mysore, Bita Mazloom, Banit Agrawal, Ti...
DLOG
2010
14 years 12 months ago
Checking Full Satisfiability of Conceptual Models
Abstract. UML class diagrams (UCDs) are the de-facto standard formalism for the analysis and design of information systems. By adopting formal language techniques to capture constr...
Alessandro Artale, Diego Calvanese, Yazmin Ang&eac...