Sciweavers

252 search results - page 10 / 51
» A Scenario-Based Approach to Protocol Design Using Evolution...
Sort
View
117
Voted
ASIACRYPT
2004
Springer
15 years 5 months ago
New Approaches to Password Authenticated Key Exchange Based on RSA
We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...
Muxiang Zhang
104
Voted
ACOM
2006
Springer
15 years 5 months ago
Towards Design Tools for Protocol Development
Interaction protocols enable agents to communicate with each other effectively. Whereas several approaches exist to specify interaction protocols, none of them has design tools th...
Pinar Yolum
ICOIN
2001
Springer
15 years 4 months ago
A 3D Modeling System for Creative Design
We propose a new approach to easily creating 3 0 geometric models. A technique called interactive evolutionary computation (IEC) is introduced to accelerate user’s invention and...
Hiroaki Nishino, Hideyuki Takagi, Sung-Bae Cho, Ko...
EUROGP
2005
Springer
115views Optimization» more  EUROGP 2005»
15 years 5 months ago
Genetic Programming in Wireless Sensor Networks
Abstract. Wireless sensor networks (WSNs) are medium scale manifestations of a paintable or amorphous computing paradigm. WSNs are becoming increasingly important as they attain gr...
Derek M. Johnson, Ankur Teredesai, Robert T. Salta...
99
Voted
ICDCS
2003
IEEE
15 years 4 months ago
Dynamic Module Replacement in Distributed Protocols
Dynamic module replacement — the ability to hot swap a component’s implementation at runtime — is fundamental to supporting evolutionary change in long-lived and highlyavail...
Nigamanth Sridhar, Scott M. Pike, Bruce W. Weide