Sciweavers

923 search results - page 163 / 185
» Proving the value of formal methods
Sort
View
WWW
2007
ACM
16 years 2 months ago
Using Google distance to weight approximate ontology matches
Discovering mappings between concept hierarchies is widely regarded as one of the hardest and most urgent problems facing the Semantic Web. The problem is even harder in domains w...
Risto Gligorov, Warner ten Kate, Zharko Aleksovski...
108
Voted
MICRO
2008
IEEE
137views Hardware» more  MICRO 2008»
15 years 1 months ago
Verification of chip multiprocessor memory systems using a relaxed scoreboard
Verification of chip multiprocessor memory systems remains challenging. While formal methods have been used to validate protocols, simulation is still the dominant method used to ...
Ofer Shacham, Megan Wachs, Alex Solomatnikov, Amin...
137
Voted
AFRICACRYPT
2010
Springer
15 years 5 months ago
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
Abstract. This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X. Standaert et al. at Eurocrypt 2009. The analyses ...
M. Abdelaziz Elaabid, Sylvain Guilley
BMCBI
2007
132views more  BMCBI 2007»
15 years 2 months ago
On the analysis of glycomics mass spectrometry data via the regularized area under the ROC curve
Background: Novel molecular and statistical methods are in rising demand for disease diagnosis and prognosis with the help of recent advanced biotechnology. High-resolution mass s...
Jingjing Ye, Hao Liu, Crystal Kirmiz, Carlito B. L...
ACISP
2009
Springer
15 years 8 months ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Kenneth G. Paterson, Sriramkrishnan Srinivasan