Sciweavers

8067 search results - page 84 / 1614
» A Model Proposal of the Interoperability Problem
Sort
View
IJISEC
2010
87views more  IJISEC 2010»
15 years 1 months ago
How to construct identity-based signatures without the key escrow problem
The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by a...
Tsz Hon Yuen, Willy Susilo, Yi Mu
GECCO
2007
Springer
196views Optimization» more  GECCO 2007»
15 years 9 months ago
An estimation of distribution algorithm with guided mutation for a complex flow shop scheduling problem
An Estimation of Distribution Algorithm (EDA) is proposed to approach the Hybrid Flow Shop with Sequence Dependent Setup Times and Uniform Machines in parallel (HFSSDST-UM) proble...
Abdellah Salhi, José Antonio Vázquez...
ICML
2007
IEEE
16 years 4 months ago
Multi-armed bandit problems with dependent arms
We provide a framework to exploit dependencies among arms in multi-armed bandit problems, when the dependencies are in the form of a generative model on clusters of arms. We find ...
Sandeep Pandey, Deepayan Chakrabarti, Deepak Agarw...
ISNN
2009
Springer
15 years 9 months ago
Use of Ensemble Based on GA for Imbalance Problem
In real-world applications, it has been observed that class imbalance (significant differences in class prior probabilities) may produce an important deterioration of the classifie...
Laura Cleofas, Rosa Maria Valdovinos, Vicente Garc...
IJNSEC
2008
104views more  IJNSEC 2008»
15 years 3 months ago
Solutions to Key Exposure Problem in Ring Signature
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we propose the first forward secure ring signature scheme and the first key-insul...
Joseph K. Liu, Duncan S. Wong