Sciweavers

7504 search results - page 18 / 1501
» Computing with Action Potentials
Sort
View
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 2 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
BIRD
2008
Springer
13 years 9 months ago
Translational Control by RNA-RNA Interaction: Improved Computation of RNA-RNA Binding Thermodynamics
The thermodynamics of RNA-RNA interaction consists of two components: the energy necessary to make a potential binding region accessible, i.e., unpaired, and the energy gained from...
Ulrike Mückstein, Hakim Tafer, Stephan H. F. ...
SASO
2007
IEEE
14 years 2 months ago
Novel Mathematics-Inspired Algorithms for Self-Adaptive Peer-to-Peer Computing
This paper describes, and evaluates benefits of, a design methodology to translate certain mathematical models into the design of novel, self-adaptive, peer-to-peer (p2p) distrib...
Steven Y. Ko, Indranil Gupta, Yookyung Jo
CG
2004
Springer
14 years 1 months ago
Learning to Estimate Potential Territory in the Game of Go
Erik C. D. van der Werf, H. Jaap van den Herik, Jo...