Sciweavers

1466 search results - page 253 / 294
» Completeness of the Authentication Tests
Sort
View
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 7 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
BMCBI
2011
14 years 7 months ago
In-silico prediction of disorder content using hybrid sequence representation
Background: Intrinsically disordered proteins play important roles in various cellular activities and their prevalence was implicated in a number of human diseases. The knowledge ...
Marcin J. Mizianty, Tuo Zhang, Bin Xue, Yaoqi Zhou...
ICDT
2011
ACM
242views Database» more  ICDT 2011»
14 years 7 months ago
Knowledge compilation meets database theory: compiling queries to decision diagrams
The goal of Knowledge Compilation is to represent a Boolean expression in a format in which it can answer a range of online-queries in PTIME. The online-query of main interest to ...
Abhay Kumar Jha, Dan Suciu
IACR
2011
104views more  IACR 2011»
14 years 3 months ago
Collusion Resistant Obfuscation and Functional Re-encryption
Program Obfuscation is the problem of transforming a program into one which is functionally equivalent, yet whose inner workings are completely unintelligible to an adversary. Des...
Nishanth Chandran, Melissa Chase, Vinod Vaikuntana...
WWW
2003
ACM
16 years 4 months ago
Efficient URL caching for world wide web crawling
Crawling the web is deceptively simple: the basic algorithm is (a) Fetch a page (b) Parse it to extract all linked URLs (c) For all the URLs not seen before, repeat (a)?(c). Howev...
Andrei Z. Broder, Marc Najork, Janet L. Wiener