Sciweavers

213 search results - page 41 / 43
» presence 2000
Sort
View
22
Voted
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
13 years 10 months ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool
CVPR
2000
IEEE
13 years 10 months ago
Detection of Obstacles in the Flight Path of an Aircraft
The National Aeronautics and Space Administration (NASA), along with members of the aircraft industry, recently developed technologies for a new supersonic aircraft. One of the te...
Tarak Gandhi, Mau-Tsuen Yang, Rangachar Kasturi, O...
RTSS
2000
IEEE
13 years 10 months ago
Efficient Scheduling of Sporadic, Aperiodic, and Periodic Tasks with Complex Constraints
Many industrial applications with real-time demands are composed of mixed sets of tasks with a variety of requirements. These can be in the form of standard timing constraints, su...
Damir Isovic, Gerhard Fohler
CGO
2008
IEEE
13 years 8 months ago
Comprehensive path-sensitive data-flow analysis
Data-flow analysis is an integral part of any aggressive optimizing compiler. We propose a framework for improving the precision of data-flow analysis in the presence of complex c...
Aditya V. Thakur, R. Govindarajan
APBC
2004
173views Bioinformatics» more  APBC 2004»
13 years 7 months ago
RNA Secondary Structure Prediction with Simple Pseudoknots
Pseudoknots are widely occurring structural motifs in RNA. Pseudoknots have been shown to be functionally important in different RNAs which play regulatory, catalytic, or structur...
Jitender S. Deogun, Ruben Donts, Olga Komina, Fang...