Sciweavers

985 search results - page 74 / 197
» On the validity of digital signatures
Sort
View
ARITH
2003
IEEE
14 years 2 months ago
Revisiting SRT Quotient Digit Selection
The quotient digit selection in the SRT division algorithm is based on a few most significant bits of the remainder and divisor, where the remainder is usually represented in a r...
Peter Kornerup
CADE
2005
Springer
14 years 9 months ago
Connecting Many-Sorted Theories
Abstract. Basically, the connection of two many-sorted theories is obtained by taking their disjoint union, and then connecting the two parts through connection functions that must...
Franz Baader, Silvio Ghilardi
DSN
2007
IEEE
14 years 26 days ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
ICMCS
2007
IEEE
163views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact
Digital images can be forged easily with today’s widely available image processing software. In this paper, we describe a passive approach to detect digital forgeries by checkin...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
BMCBI
2011
13 years 15 days ago
Cell Subset Prediction for Blood Genomic Studies
Background: Genome-wide transcriptional profiling of patient blood samples offers a powerful tool to investigate underlying disease mechanisms and personalized treatment decisions...
Christopher R. Bolen, Mohamed Uduman, Steven H. Kl...