Sciweavers

798 search results - page 147 / 160
» Proving More Properties with Bounded Model Checking
Sort
View
CSFW
2012
IEEE
11 years 10 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
BMCBI
2010
208views more  BMCBI 2010»
13 years 7 months ago
A multi-filter enhanced genetic ensemble system for gene selection and sample classification of microarray data
Background: Feature selection techniques are critical to the analysis of high dimensional datasets. This is especially true in gene selection from microarray data which are common...
Pengyi Yang, Bing Bing Zhou, Zili Zhang, Albert Y....
ICRA
2008
IEEE
104views Robotics» more  ICRA 2008»
14 years 2 months ago
High performance control for graceful motion of an intelligent wheelchair
— To be acceptable to human drivers, the motion of an intelligent robotic wheelchair must be more than just collision-free: it must be graceful. We define graceful motion as bei...
Shilpa Gulati, Benjamin Kuipers
DC
2010
13 years 2 months ago
Closing the complexity gap between FCFS mutual exclusion and mutual exclusion
First-Come-First-Served (FCFS) mutual exclusion (ME) is the problem of ensuring that processes attempting to concurrently access a shared resource do so one by one, in a fair order...
Robert Danek, Wojciech M. Golab
ICFP
2005
ACM
14 years 7 months ago
Toward a general theory of names: binding and scope
High-level formalisms for reasoning about names and binding such uijn indices, various flavors of higher-order abstract syntax, ry of Contexts, and nominal abstract syntax address...
James Cheney