Sciweavers

3713 search results - page 653 / 743
» Constructing a Calculus of Programs
Sort
View
NDSS
2003
IEEE
14 years 3 months ago
Fighting Spam by Encapsulating Policy in Email Addresses
Everyday network interactions require users to give out their email address, yet no guarantees can be made about how this address will be used. Sometimes the address is given to a...
John Ioannidis
VTS
2003
IEEE
115views Hardware» more  VTS 2003»
14 years 3 months ago
Fault Testing for Reversible Circuits
Irreversible computation necessarily results in energy dissipation due to information loss. While small in comparison to the power consumption of today’s VLSI circuits, if curre...
Ketan N. Patel, John P. Hayes, Igor L. Markov
CIKM
2003
Springer
14 years 3 months ago
HyperThesis: the gRNA spell on the curse of bioinformatics applications integration
In this paper, we describe a graphical workflow management system called HyperThesis to address the challenges of integrating bioinformatics applications. HyperThesis is an integ...
Sourav S. Bhowmick, Vivek Vedagiri, Amey V. Laud
IFIP
2003
Springer
14 years 3 months ago
Prediction-Based Energy Map for Wireless Sensor Networks
A fundamental issue in the design of a wireless sensor network is to devise mechanisms to make efficient use of its energy, and thus, extend its lifetime. The information about th...
Raquel A. F. Mini, Antonio Alfredo Ferreira Lourei...
INDOCRYPT
2003
Springer
14 years 3 months ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel