Sciweavers

352 search results - page 58 / 71
» Right Association Revisited
Sort
View
SC
2005
ACM
14 years 1 months ago
Leading Computational Methods on Scalar and Vector HEC Platforms
The last decade has witnessed a rapid proliferation of superscalar cache-based microprocessors to build high-end computing (HEC) platforms, primarily because of their generality, ...
Leonid Oliker, Jonathan Carter, Michael F. Wehner,...
CCS
2005
ACM
14 years 1 months ago
A rewriting-based inference system for the NRL protocol analyzer: grammar generation
The NRL Protocol Analyzer (NPA) is a tool for the formal specification and analysis of cryptographic protocols that has been used with great effect on a number of complex real-l...
Santiago Escobar, Catherine Meadows, José M...
18
Voted
FC
2005
Springer
97views Cryptology» more  FC 2005»
14 years 1 months ago
Time Capsule Signature
Abstract. We introduce a new cryptographic problem called time capsule signature. Time capsule signature is a ‘future signature’ that becomes valid from a specific future time...
Yevgeniy Dodis, Dae Hyun Yum
GECCO
2005
Springer
160views Optimization» more  GECCO 2005»
14 years 1 months ago
Exploring relationships between genotype and oral cancer development through XCS
In medical research, being able to justify decisions is generally as important as taking the right ones. Interpretability is then one of the chief characteristics a learning algor...
Alessandro Passaro, Flavio Baronti, Valentina Magg...
INTETAIN
2005
Springer
14 years 1 months ago
Multi-user Multi-touch Games on DiamondTouch with the DTFlash Toolkit
Games and other forms of tabletop electronic entertainment are a natural application of the new multi-user multi-touch tabletop technology DiamondTouch [3]. Electronic versions of...
Alan Esenther, Kent Wittenburg