Sciweavers

1913 search results - page 95 / 383
» Group Input Machine
Sort
View
140
Voted
ACSW
2004
15 years 3 months ago
A Framework for Obfuscated Interpretation
Software protection via obscurity is now considered fundamental for securing software systems. This paper proposes a framework for obfuscating the program interpretation instead o...
Akito Monden, Antoine Monsifrot, Clark D. Thombors...
CNIS
2006
15 years 3 months ago
Design of a virtual computer security lab
We present the design and a prototype of a lab course on computer security, the necessity of which arises from the students' need to complement course work by hands-on experi...
Jörg Keller, Ralf Naues
CSB
2003
IEEE
128views Bioinformatics» more  CSB 2003»
15 years 7 months ago
Degenerate Primer Design via Clustering
This paper describes a new strategy for designing degenerate primers for a given multiple alignment of amino acid sequences. Degenerate primers are useful for amplifying homologou...
Xintao Wei, David N. Kuhn, Giri Narasimhan
ESA
2008
Springer
195views Algorithms» more  ESA 2008»
15 years 4 months ago
A Characterization of 2-Player Mechanisms for Scheduling
We study the mechanism design problem of scheduling unrelated machines and we completely characterize the decisive truthful mechanisms for two players when the domain contains bot...
George Christodoulou, Elias Koutsoupias, Angelina ...
FSTTCS
2010
Springer
15 years 15 days ago
Colored Hypergraph Isomorphism is Fixed Parameter Tractable
We describe a fixed parameter tractable (fpt) algorithm for Colored Hypergraph Isomorphism which has running time 2O(b) NO(1) , where the parameter b is the maximum size of the col...
Vikraman Arvind, Bireswar Das, Johannes Köble...