Sciweavers

913 search results - page 129 / 183
» Full Abstraction for Linda
Sort
View
WRLA
2010
13 years 8 months ago
Folding Variant Narrowing and Optimal Variant Termination
Abstract. If a set of equations E∪Ax is such that E is confluent, terminating, and coherent modulo Ax, narrowing with E modulo Ax provides a complete E∪Ax-unification algorit...
Santiago Escobar, Ralf Sasse, José Meseguer
BIOCOMP
2010
13 years 8 months ago
A Model Reduction Technique for Stochastic Biochemical Kinetics
Abstract-- Modeling the intermolecular reactions in a single cell is a critical problem in computational biology. Biochemical reaction systems often involve species in both low and...
Silvana Ilie, Ekaterina Kudashkina
CANS
2010
Springer
258views Cryptology» more  CANS 2010»
13 years 8 months ago
Cryptanalysis of Reduced-Round MIBS Block Cipher
Abstract. This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at ...
Asli Bay, Jorge Nakahara, Serge Vaudenay
FPL
2010
Springer
129views Hardware» more  FPL 2010»
13 years 8 months ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
GLOBECOM
2010
IEEE
13 years 8 months ago
Space-Time Network Codes Utilizing Transform-Based Coding
Abstract-- Cooperative communications can be used to improve communication reliability. However, the transmissions from different relaying nodes result in a great challenge in prac...
Hung-Quoc Lai, Zhenzhen Gao, K. J. Ray Liu