Sciweavers

3736 search results - page 655 / 748
» Generative Programming
Sort
View
ESORICS
2008
Springer
15 years 4 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi
89
Voted
JMM2
2007
96views more  JMM2 2007»
15 years 2 months ago
Software Watermarking Resilient to Debugging Attacks
Abstract— In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The softw...
Gaurav Gupta, Josef Pieprzyk
118
Voted
BMCBI
2006
108views more  BMCBI 2006»
15 years 2 months ago
RibAlign: a software tool and database for eubacterial phylogeny based on concatenated ribosomal protein subunits
Background: Until today, analysis of 16S ribosomal RNA (rRNA) sequences has been the de-facto gold standard for the assessment of phylogenetic relationships among prokaryotes. How...
Hanno Teeling, Frank Oliver Glöckner
BMCBI
2007
106views more  BMCBI 2007»
15 years 2 months ago
Simultaneous identification of long similar substrings in large sets of sequences
Background: Sequence comparison faces new challenges today, with many complete genomes and large libraries of transcripts known. Gene annotation pipelines match these sequences in...
Jürgen Kleffe, Friedrich Möller, Burghar...
115
Voted
DAC
2005
ACM
15 years 4 months ago
How accurately can we model timing in a placement engine?
This paper presents a novel placement algorithm for timing optimization based on a new and powerful concept, which we term differential timing analysis. Recognizing that accurate ...
Amit Chowdhary, Karthik Rajagopal, Satish Venkates...