Sciweavers

1058 search results - page 89 / 212
» It's Doomed; We Can Prove It
Sort
View
WINE
2009
Springer
121views Economy» more  WINE 2009»
15 years 4 months ago
Gaming Dynamic Parimutuel Markets
We study the strategic behavior of risk-neutral non-myopic agents in Dynamic Parimutuel Markets (DPM). In a DPM, agents buy or sell shares of contracts, whose future payoff in a p...
Qianya Lin, Yiling Chen
BMCBI
2008
102views more  BMCBI 2008»
14 years 10 months ago
Improving protein function prediction methods with integrated literature data
Background: Determining the function of uncharacterized proteins is a major challenge in the post-genomic era due to the problem's complexity and scale. Identifying a protein...
Aaron Gabow, Sonia M. Leach, William A. Baumgartne...
POPL
1991
ACM
15 years 1 months ago
Subtyping Recursive Types
We investigate the interactions of subtyping and recursive types, in a simply typed λ-calculus. The two fundamental questions here are whether two (recursive) types are in the su...
Roberto M. Amadio, Luca Cardelli
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
14 years 7 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
CSFW
2012
IEEE
13 years 10 days ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...