Sciweavers

1626 search results - page 249 / 326
» Subtyping with Power Types
Sort
View
CORR
2006
Springer
125views Education» more  CORR 2006»
15 years 4 months ago
Reversible Logic to Cryptographic Hardware: A New Paradigm
Differential Power Analysis (DPA) presents a major challenge to mathematically-secure cryptographic protocols. Attackers can break the encryption by measuring the energy consumed i...
Himanshu Thapliyal, Mark Zwolinski
BMCBI
2007
92views more  BMCBI 2007»
15 years 4 months ago
Nanopore current transduction analysis of protein binding to non-terminal and terminal DNA regions: analysis of transcription fa
Background: Synthetic transcription factors (STFs) promise to offer a powerful new therapeutic against Cancer, AIDS, and genetic disease. Currently, 10% of drugs are of this type,...
Stephen Winters-Hilt, Amanda Davis, Iftekhar Amin,...
CAD
2007
Springer
15 years 4 months ago
Boundary of the volume swept by a free-form solid in screw motion
The swept volume of a moving solid is a powerful computational and visualization concept. It provides an excellent aid for path and accessibility planning in robotics and for simu...
Jarek Rossignac, J. J. Kim, S. C. Song, K. C. Suh,...
JCS
2008
88views more  JCS 2008»
15 years 4 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
JNCA
2008
117views more  JNCA 2008»
15 years 4 months ago
Assessing readiness of IP networks to support desktop videoconferencing using OPNET
OPNET is a powerful network design and simulation tool that has gained popularity in industry and academia. However, there exists no known simulation approach on how to deploy a p...
Khaled Salah, Prasad Calyam, M. I. Buhari