Sciweavers

210 search results - page 13 / 42
» A Formal Theory of Key Conjuring
Sort
View
GECCO
2008
Springer
146views Optimization» more  GECCO 2008»
13 years 8 months ago
A formal performance modeling framework for bio-inspired ad hoc routing protocols
Bio-inspired ad hoc routing is an active area of research. The designers of these algorithms predominantly evaluate the performance of their protocols with the help of simulation ...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
TPHOL
2009
IEEE
14 years 2 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
JCB
2007
144views more  JCB 2007»
13 years 7 months ago
Statistical Estimation of Statistical Mechanical Models: Helix-Coil Theory and Peptide Helicity Prediction
Analysis of biopolymer sequences and structures generally adopts one of two approaches: use of detailed biophysical theoretical models of the system with experimentally-determined...
Scott C. Schmidler, Joseph E. Lucas, Terrence G. O...
STOC
1993
ACM
134views Algorithms» more  STOC 1993»
13 years 11 months ago
Quantum complexity theory
In this paper we study quantum computation from a complexity theoretic viewpoint. Our first result is the existence of an efficient universal quantum Turing machine in Deutsch’s...
Ethan Bernstein, Umesh V. Vazirani
CORR
2011
Springer
188views Education» more  CORR 2011»
13 years 2 months ago
Primitive words and roots of words
In the algebraic theory of codes and formal languages, the set Q of all primitive words over some alphabet Σ has received special interest. With this survey article we give an ove...
Gerhard Lischke