Sciweavers

985 search results - page 74 / 197
» On the validity of digital signatures
Sort
View
101
Voted
ARITH
2003
IEEE
15 years 3 months ago
Revisiting SRT Quotient Digit Selection
The quotient digit selection in the SRT division algorithm is based on a few most significant bits of the remainder and divisor, where the remainder is usually represented in a r...
Peter Kornerup
73
Voted
CADE
2005
Springer
15 years 10 months ago
Connecting Many-Sorted Theories
Abstract. Basically, the connection of two many-sorted theories is obtained by taking their disjoint union, and then connecting the two parts through connection functions that must...
Franz Baader, Silvio Ghilardi
101
Voted
DSN
2007
IEEE
15 years 2 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
ICMCS
2007
IEEE
163views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact
Digital images can be forged easily with today’s widely available image processing software. In this paper, we describe a passive approach to detect digital forgeries by checkin...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
118
Voted
BMCBI
2011
14 years 1 months ago
Cell Subset Prediction for Blood Genomic Studies
Background: Genome-wide transcriptional profiling of patient blood samples offers a powerful tool to investigate underlying disease mechanisms and personalized treatment decisions...
Christopher R. Bolen, Mohamed Uduman, Steven H. Kl...