Sciweavers

1321 search results - page 230 / 265
» Logic Simulation Using Networks of State Machines
Sort
View
DRM
2006
Springer
15 years 1 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
BMCBI
2006
159views more  BMCBI 2006»
14 years 9 months ago
Prediction of protein continuum secondary structure with probabilistic models based on NMR solved structures
Background: The structure of proteins may change as a result of the inherent flexibility of some protein regions. We develop and explore probabilistic machine learning methods for...
Mikael Bodén, Zheng Yuan, Timothy L. Bailey
184
Voted
POPL
2009
ACM
15 years 10 months ago
Verifying distributed systems: the operational approach
This work develops an integrated approach to the verification of behaviourally rich programs, founded directly on operational semantics. The power of the approach is demonstrated ...
Tom Ridge
72
Voted
ATAL
2009
Springer
15 years 4 months ago
Abstraction in model checking multi-agent systems
ion in model checking multi-agent systems Mika Cohen Department of Computing Imperial College London London, UK Mads Dam Access Linnaeus Center Royal Institute of Technology Stockh...
Mika Cohen, Mads Dam, Alessio Lomuscio, Francesco ...
DSN
2004
IEEE
15 years 1 months ago
FRTR: A Scalable Mechanism for Global Routing Table Consistency
This paper presents a scalable mechanism, Fast Routing Table Recovery (FRTR), for detecting and correcting route inconsistencies between neighboring BGP routers. The large size of...
Lan Wang, Daniel Massey, Keyur Patel, Lixia Zhang