Sciweavers

17789 search results - page 145 / 3558
» Exceptional Use Cases
Sort
View
137
Voted
FOCS
2007
IEEE
15 years 7 months ago
Space-Efficient Identity Based Encryption Without Pairings
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. One exception is an elegant system due to Cocks which build...
Dan Boneh, Craig Gentry, Michael Hamburg
118
Voted
CHARME
2001
Springer
92views Hardware» more  CHARME 2001»
15 years 7 months ago
Formal Verification of the VAMP Floating Point Unit
We report on the formal verification of the floating point unit used in the VAMP processor. The FPU is fully IEEE compliant, and supports denormals and exceptions in hardware. The ...
Christoph Berg, Christian Jacobi 0002
62
Voted
BMCBI
2008
80views more  BMCBI 2008»
15 years 3 months ago
The XBabelPhish MAGE-ML and XML Translator
Background: MAGE-ML has been promoted as a standard format for describing microarray experiments and the data they produce. Two characteristics of the MAGE-ML format compromise it...
Donald Maier, Farrell Wymore, Gavin Sherlock, Cath...
147
Voted
TIME
2009
IEEE
15 years 10 months ago
Axiomatizations for Temporal Epistemic Logic with Perfect Recall over Linear Time
—This paper presents various semantic interpretations for logics of knowledge and time with prefect recall. We allow both past and future operators and examine the interpretation...
Szabolcs Mikulás, Mark Reynolds, Tim French
89
Voted
CDC
2008
IEEE
109views Control Systems» more  CDC 2008»
15 years 10 months ago
Shortest paths on 3-D simple Lie groups with nonholonomic constraint
— In this paper we study the Carnot-Caratheodory metrics on SU(2) S3 , SO(3) and SL(2) induced by their Cartan decomposition and by the Killing form. Besides computing explicitly...
Ugo V. Boscain, Francesco Rossi