Sciweavers

539 search results - page 93 / 108
» The N R One Time Password System
Sort
View
OSDI
2002
ACM
15 years 10 months ago
CMC: A Pragmatic Approach to Model Checking Real Code
Many system errors do not emerge unless some intricate sequence of events occurs. In practice, this means that most systems have errors that only trigger after days or weeks of ex...
Madanlal Musuvathi, David Y. W. Park, Andy Chou, D...
ACMSE
2007
ACM
15 years 1 months ago
Chinese remainder theorem based group key management
In this paper, we present two new centralized group key management protocols based on the Chinese Remainder Theorem (CRT). By shifting more computing load onto the key server we o...
Xinliang Zheng, Chin-Tser Huang, Manton M. Matthew...
CGA
2006
14 years 9 months ago
The Distance-Similarity Metaphor in Region-Display Spatializations
n explore and understand abstract information spaces as if they were real geographic spaces. According to the distance-similarity metaphor1 one of the most popular spatial metaphor...
Sara Irina Fabrikant, Daniel R. Montello, David M....
CORR
2010
Springer
127views Education» more  CORR 2010»
14 years 4 months ago
Complexity of Data Dependence problems for Program Schemas with Concurrency
am analysis and has been widely studied. In this paper we consider this problem at the abstraction level of program schemas in which computations occur in the Herbrand domain of te...
Sebastian Danicic, Robert M. Hierons, Michael R. L...
ICPPW
2009
IEEE
14 years 7 months ago
A Scalable Parallel Approach for Peptide Identification from Large-Scale Mass Spectrometry Data
Identifying peptides, which are short polymeric chains of amino acid residues in a protein sequence, is of fundamental importance in systems biology research. The most popular appr...
Gaurav Ramesh Kulkarni, Ananth Kalyanaraman, Willi...