Sciweavers

410 search results - page 71 / 82
» Tools for System Validation with B Abstract Machines
Sort
View
ICC
2007
IEEE
143views Communications» more  ICC 2007»
14 years 1 months ago
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Abstract— The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to e...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
ESORICS
2008
Springer
13 years 9 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi
27
Voted
BMCBI
2007
99views more  BMCBI 2007»
13 years 7 months ago
The Deuterator: software for the determination of backbone amide deuterium levels from H/D exchange MS data
Background: The combination of mass spectrometry and solution phase amide hydrogen/deuterium exchange (H/D exchange) experiments is an effective method for characterizing protein ...
B. D. Pascal, M. J. Chalmers, S. A. Busby, C. C. M...
CLUSTER
2009
IEEE
13 years 11 months ago
24/7 Characterization of petascale I/O workloads
Abstract--Developing and tuning computational science applications to run on extreme scale systems are increasingly complicated processes. Challenges such as managing memory access...
Philip H. Carns, Robert Latham, Robert B. Ross, Ka...
BMCBI
2010
129views more  BMCBI 2010»
13 years 7 months ago
LAITOR - Literature Assistant for Identification of Terms co-Occurrences and Relationships
Background: Biological knowledge is represented in scientific literature that often describes the function of genes/ proteins (bioentities) in terms of their interactions (biointe...
Adriano Barbosa-Silva, Theodoros G. Soldatos, Ivan...