Sciweavers

310 search results - page 61 / 62
» dam 2008
Sort
View
FC
2009
Springer
95views Cryptology» more  FC 2009»
13 years 11 months ago
Secure Multiparty Computation Goes Live
In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptogr...
Peter Bogetoft, Dan Lund Christensen, Ivan Damg&ar...
ENVSOFT
2008
55views more  ENVSOFT 2008»
13 years 5 months ago
A simple algorithm for yield estimates: Evaluation for semi-arid irrigated winter wheat monitored with green leaf area index
In this study we investigated the perspective offered by coupling a simple vegetation growth model and ground-based remotely-sensed data for the monitoring of wheat production. A ...
Benoît Duchemin, Philippe Maisongrande, Gill...
ATAL
2008
Springer
13 years 7 months ago
An agent-oriented approach to support change propagation in software evolution
Software maintenance and evolution is arguably a lengthy and expensive phase in the life cycle of a software system. A critical issue at this phase is change propagation: given a ...
Khanh Hoa Dam
AOSE
2008
Springer
13 years 7 months ago
Evaluating an Agent-Oriented Approach for Change Propagation
A central problem in software maintenance is change propagation: given a set of primary changes that have been made to software, what additional secondary changes are needed? Altho...
Khanh Hoa Dam, Michael Winikoff
GECCO
2008
Springer
111views Optimization» more  GECCO 2008»
13 years 6 months ago
Computational scenario-based capability planning
Scenarios are pen-pictures of plausible futures, used for strategic planning. The aim of this investigation is to expand the horizon of scenario-based planning through computation...
Hussein A. Abbass, Axel Bender, Hai Huong Dam, Ste...