Sciweavers

1678 search results - page 79 / 336
» An ASM Specification of C
Sort
View
ESORICS
2008
Springer
13 years 9 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi
BMCBI
2002
119views more  BMCBI 2002»
13 years 7 months ago
Microarray results: how accurate are they?
Background: DNA microarray technology is a powerful technique that was recently developed in order to analyze thousands of genes in a short time. Presently, microarrays, or chips,...
Ravi Kothapalli, Sean J. Yoder, Shrikant Mane, Tho...
TOOLS
1998
IEEE
13 years 12 months ago
Implementation of a Geospatial Imagery Digital Library Using Java and CORBA
We have implemented a prototype distributed system for managing and accessing a digital library of geospatial imagery over a wide-area network. The system conforms to a subset of ...
Paul D. Coddington, Kenneth A. Hawick, K. E. Kerry...
COLT
2006
Springer
13 years 11 months ago
Efficient Learning Algorithms Yield Circuit Lower Bounds
We describe a new approach for understanding the difficulty of designing efficient learning algorithms. We prove that the existence of an efficient learning algorithm for a circui...
Lance Fortnow, Adam R. Klivans
BMCBI
2008
146views more  BMCBI 2008»
13 years 7 months ago
nGASP - the nematode genome annotation assessment project
Background: While the C. elegans genome is extensively annotated, relatively little information is available for other Caenorhabditis species. The nematode genome annotation asses...
Avril Coghlan, Tristan J. Fiedler, Sheldon J. McKa...