Sciweavers

811 search results - page 140 / 163
» Flow Theory: An Enhancement
Sort
View
CIIA
2009
13 years 9 months ago
LCF-style for Secure Verification Platform based on Multiway Decision Graphs
Abstract. Formal verification of digital systems is achieved, today, using one of two main approaches: states exploration (mainly model checking and equivalence checking) or deduct...
Sa'ed Abed, Otmane Aït Mohamed
CORR
2010
Springer
60views Education» more  CORR 2010»
13 years 8 months ago
A Novel Scheme for Secured Data Transfer Over Computer Networks
: This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a `jigsaw puzzle&#...
Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 8 months ago
Optimal Design of a Molecular Recognizer: Molecular Recognition as a Bayesian Signal Detection Problem
Numerous biological functions--such as enzymatic catalysis, the immune response system, and the DNA-protein regulatory network--rely on the ability of molecules to specifically rec...
Yonatan Savir, Tsvi Tlusty
CORR
2008
Springer
137views Education» more  CORR 2008»
13 years 8 months ago
Combining generic judgments with recursive definitions
Many semantical aspects of programming languages are specified through calculi for constructing proofs: consider, for example, the specification of structured operational semantic...
Andrew Gacek, Dale Miller, Gopalan Nadathur
IJBC
2008
112views more  IJBC 2008»
13 years 8 months ago
Computation and Visualization of bifurcation Surfaces
The localization of critical parameter sets called bifurcations is often a central task of the analysis of a nonlinear dynamical system. Bifurcations of codimension 1 that can be ...
Dirk Stiefs, Thilo Gross, Ralf Steuer, Ulrike Feud...