Sciweavers

434 search results - page 40 / 87
» Logical Analysis of Hash Functions
Sort
View
112
Voted
CASES
2003
ACM
15 years 5 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
87
Voted
WILF
2007
Springer
147views Fuzzy Logic» more  WILF 2007»
15 years 6 months ago
Fuzzy Ensemble Clustering for DNA Microarray Data Analysis
Two major problems related the unsupervised analysis of gene expression data are represented by the accuracy and reliability of the discovered clusters, and by the biological fact ...
Roberto Avogadri, Giorgio Valentini
MFCS
2001
Springer
15 years 5 months ago
Computable Versions of Baire's Category Theorem
We study different computable versions of Baire’s Category Theorem in computable analysis. Similarly, as in constructive analysis, different logical forms of this theorem lead ...
Vasco Brattka
93
Voted
JAR
2007
83views more  JAR 2007»
15 years 11 days ago
Theory Extension in ACL2(r)
ACL2(r) is a modified version of the theorem prover ACL2 that adds support for the irrational numbers using non-standard analysis. It has been used to prove basic theorems of anal...
Ruben Gamboa, John R. Cowles
94
Voted
PODS
2008
ACM
110views Database» more  PODS 2008»
16 years 18 days ago
Static analysis of active XML systems
Active XML is a high-level specification language tailored to dataintensive, distributed, dynamic Web services. Active XML is based on XML documents with embedded function calls. ...
Serge Abiteboul, Luc Segoufin, Victor Vianu