Sciweavers

448 search results - page 65 / 90
» Playing With Population Protocols
Sort
View
AOSD
2005
ACM
14 years 2 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
CRYPTO
2000
Springer
149views Cryptology» more  CRYPTO 2000»
14 years 24 days ago
A Cryptographic Solution to a Game Theoretic Problem
In this work we use cryptography to solve a game-theoretic problem which arises naturally in the area of two party strategic games. The standard game-theoretic solution concept for...
Yevgeniy Dodis, Shai Halevi, Tal Rabin
BMCBI
2008
105views more  BMCBI 2008»
13 years 8 months ago
Novel computational methods for increasing PCR primer design effectiveness in directed sequencing
Background: Polymerase chain reaction (PCR) is used in directed sequencing for the discovery of novel polymorphisms. As the first step in PCR directed sequencing, effective PCR pr...
Kelvin Li, Anushka Brownley, Timothy B. Stockwell,...
BIRTHDAY
2012
Springer
12 years 4 months ago
Deniable RSA Signature - The Raise and Fall of Ali Baba
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evi...
Serge Vaudenay
SOSP
2007
ACM
14 years 5 months ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...