Sciweavers

1082 search results - page 179 / 217
» tools 2000
Sort
View
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
14 years 1 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
PLDI
2000
ACM
14 years 1 months ago
Off-line variable substitution for scaling points-to analysis
Most compiler optimizations and software productivity tools rely on information about the effects of pointer dereferences in a program. The purpose of points-to analysis is to com...
Atanas Rountev, Satish Chandra
POPL
2000
ACM
14 years 1 months ago
Resource Bound Certification
Various code certification systems allow the certification and static verification of important safety properties such as memory and control-flow safety. These systems are valuabl...
Karl Crary, Stephanie Weirich
PRICAI
2000
Springer
14 years 1 months ago
Improved Efficiency of Oil Well Drilling through Case Based Reasoning
A system that applies a method of knowledge-intensive case-based reasoning, for repair and prevention of unwanted events in the domain of offshore oil well drilling, has been deve...
Pål Skalle, Jostein Sveen, Agnar Aamodt
RECOMB
2000
Springer
14 years 1 months ago
Using Bayesian networks to analyze expression data
DNA hybridization arrays simultaneously measure the expression level for thousands of genes. These measurements provide a "snapshot" of transcription levels within the c...
Nir Friedman, Michal Linial, Iftach Nachman, Dana ...