Sciweavers

1818 search results - page 83 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
ISDA
2006
IEEE
14 years 2 months ago
From Gene to Drug: A Proof of Concept for a Plausible Computational Pathway
The last decade has witnessed an exponential growth of sequence information in the field of biological macromolecules such as proteins and nucleic acids and their interactions wit...
Sandhya Shenoy, B. Jayaram, N. Latha, Pooja Narang...
PLDI
2006
ACM
14 years 2 months ago
Termination proofs for systems code
Program termination is central to the process of ensuring that systems code can always react. We describe a new program termination prover that performs a path-sensitive and conte...
Byron Cook, Andreas Podelski, Andrey Rybalchenko
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
14 years 2 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
ATAL
2004
Springer
14 years 2 months ago
Strategy/False-name Proof Protocols for Combinatorial Multi-Attribute Procurement Auction
In this paper, we investigate a model of a combinatorial, procurement multi-attribute auction, in which each sales item is defined by several attributes called quality, the buyer...
Takayuki Suyama, Makoto Yokoo
INFOCOM
2003
IEEE
14 years 2 months ago
Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks
— Mobile ad hoc networking has been an active research area for several years. How to stimulate cooperation among selfish mobile nodes, however, is not well addressed yet. In th...
Sheng Zhong, Jiang Chen, Yang Richard Yang