Sciweavers

2000 search results - page 342 / 400
» Program Transformation and Proof Transformation
Sort
View
BMCBI
2010
145views more  BMCBI 2010»
15 years 3 months ago
WaveletQuant, an improved quantification software based on wavelet signal threshold de-noising for labeled quantitative proteomi
Background: Quantitative proteomics technologies have been developed to comprehensively identify and quantify proteins in two or more complex samples. Quantitative proteomics base...
Fan Mo, Qun Mo, Yuanyuan Chen, David R. Goodlett, ...
ASPLOS
2011
ACM
14 years 7 months ago
On-the-fly elimination of dynamic irregularities for GPU computing
The power-efficient massively parallel Graphics Processing Units (GPUs) have become increasingly influential for scientific computing over the past few years. However, their ef...
Eddy Z. Zhang, Yunlian Jiang, Ziyu Guo, Kai Tian, ...
ASPLOS
2011
ACM
14 years 7 months ago
Mementos: system support for long-running computation on RFID-scale devices
Transiently powered computing devices such as RFID tags, kinetic energy harvesters, and smart cards typically rely on programs that complete a task under tight time constraints be...
Benjamin Ransford, Jacob Sorber, Kevin Fu
ESORICS
2009
Springer
16 years 4 months ago
Formal Indistinguishability Extended to the Random Oracle Model
Abstract. Several generic constructions for transforming one-way functions to asymmetric encryption schemes have been proposed. One-way functions only guarantee the weak secrecy of...
Cristian Ene, Yassine Lakhnech, Van Chan Ngo
TCC
2009
Springer
123views Cryptology» more  TCC 2009»
16 years 3 months ago
Hierarchical Identity Based Encryption with Polynomially Many Levels
We present the first hierarchical identity based encryption (HIBE) system that has full security for more than a constant number of levels. In all prior HIBE systems in the literat...
Craig Gentry, Shai Halevi