Sciweavers

253 search results - page 48 / 51
» Compositional Analysis of Authentication Protocols
Sort
View
BMCBI
2008
115views more  BMCBI 2008»
13 years 7 months ago
Probe signal correction for differential methylation hybridization experiments
Background: Non-biological signal (or noise) has been the bane of microarray analysis. Hybridization effects related to probe-sequence composition and DNA dye-probe interactions h...
Dustin P. Potter, Pearlly Yan, Tim Hui-Ming Huang,...
CAV
2000
Springer
197views Hardware» more  CAV 2000»
13 years 12 months ago
Bounded Model Construction for Monadic Second-Order Logics
Address: Abstraction, Composition, Symmetry, and a Little Deduction: The Remedies to State Explosion . . . . . . . . . . . . . . . . . . . . . . . . . . 1 A. Pnueli Invited Address...
Abdelwaheb Ayari, David A. Basin
BMCBI
2004
128views more  BMCBI 2004»
13 years 7 months ago
cuticleDB: a relational database of Arthropod cuticular proteins
Background: The insect exoskeleton or cuticle is a bi-partite composite of proteins and chitin that provides protective, skeletal and structural functions. Little information is a...
Christiana K. Magkrioti, Ioannis C. Spyropoulos, V...
WISEC
2009
ACM
14 years 2 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
IPPS
2005
IEEE
14 years 1 months ago
Characterizing Secure Dynamic Web Applications Scalability
Security in the access to web contents and the interaction with web sites is becoming one of the most important issues in Internet. Servers need to provide certain levels of secur...
Jordi Guitart, Vicenç Beltran, David Carrer...