Sciweavers

1466 search results - page 154 / 294
» Completeness of the Authentication Tests
Sort
View
DNA
2005
Springer
132views Bioinformatics» more  DNA 2005»
14 years 1 months ago
DNA Recombination by XPCR
The first step of the Adleman-Lipton extract model in DNA computing is the combinatorial generation of libraries. In this paper a new method is proposed for generating a initial p...
Giuditta Franco, Vincenzo Manca, Cinzia Giagulli, ...
FROCOS
2005
Springer
14 years 1 months ago
Logical Analysis of Hash Functions
Abstract. In this paper we report on a novel approach for uniform encoding of hash functions (but also other cryptographic functions) into propositional logic formulae, and reducin...
Dejan Jovanovic, Predrag Janicic
SPW
2005
Springer
14 years 1 months ago
Countering Automated Exploits with System Security CAPTCHAS
Abstract. Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users c...
Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Au...
ATAL
2004
Springer
14 years 1 months ago
Botticelli: A Supply Chain Management Agent
The paper describes the architecture of Brown University’s agent, Botticelli, a finalist in the 2003 Trading Agent Competition in Supply Chain Management (TAC SCM). In TAC SCM,...
Michael Benisch, Amy R. Greenwald, Ioanna Grypari,...
CAV
2004
Springer
128views Hardware» more  CAV 2004»
14 years 1 months ago
Proving More Properties with Bounded Model Checking
Bounded Model Checking, although complete in theory, has been thus far limited in practice to falsification of properties that were not invariants. In this paper we propose a term...
Mohammad Awedh, Fabio Somenzi