Sciweavers

7393 search results - page 1321 / 1479
» Synthesis-for-testability using transformations
Sort
View
ACNS
2006
Springer
117views Cryptology» more  ACNS 2006»
15 years 9 months ago
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
We study the influence of collision-finding attacks on the security of time-stamping schemes. We distinguish between client-side hash functions used to shorten the documents befo...
Ahto Buldas, Sven Laur
NPAR
2004
ACM
15 years 8 months ago
Image and video based painterly animation
ssionism”, (bottom row) “Abstract”, “Pointillism”, “Flower” and “Abstract” styles. Figure 3 shows some of the brush strokes used. We present techniques for trans...
James Hays, Irfan A. Essa
UIST
2004
ACM
15 years 8 months ago
Citrine: providing intelligent copy-and-paste
We present Citrine, a system that extends the widespread copy-and-paste interaction technique with intelligent transformations, making it useful in more situations. Citrine uses t...
Jeffrey Stylos, Brad A. Myers, Andrew Faulring
FAST
2004
15 years 4 months ago
Tracefs: A File System to Trace Them All
File system traces have been used for years to analyze user behavior and system software behavior, leading to advances in file system and storage technologies. Existing traces, ho...
Akshat Aranya, Charles P. Wright, Erez Zadok
BMCBI
2008
160views more  BMCBI 2008»
15 years 3 months ago
Predicting cancer involvement of genes from heterogeneous data
Background: Systematic approaches for identifying proteins involved in different types of cancer are needed. Experimental techniques such as microarrays are being used to characte...
Ramon Aragues, Chris Sander, Baldo Oliva
« Prev « First page 1321 / 1479 Last » Next »