Sciweavers

1585 search results - page 239 / 317
» A framework for computer-aided validation
Sort
View
105
Voted
NOSSDAV
2004
Springer
15 years 9 months ago
Considering altruism in peer-to-peer internet streaming broadcast
In peer-to-peer overlay for video broadcast, peers contribute a portion of the bandwidth to the overlay in return for the service. In the presence of network heterogeneity, it is ...
Yang-Hua Chu, Hui Zhang
PPSN
2004
Springer
15 years 9 months ago
Dominance Based Crossover Operator for Evolutionary Multi-objective Algorithms
In spite of the recent quick growth of the Evolutionary Multi-objective Optimization (EMO) research field, there has been few trials to adapt the general variation operators to t...
Olga Rudenko, Marc Schoenauer
SACRYPT
2004
Springer
143views Cryptology» more  SACRYPT 2004»
15 years 9 months ago
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
Abstract. This paper formalizes the security adversarial games for online symmetric cryptosystems in a unified framework for deterministic and probabilistic encryption schemes. On...
Pierre-Alain Fouque, Antoine Joux, Guillaume Poupa...
143
Voted
VLDB
2004
ACM
126views Database» more  VLDB 2004»
15 years 9 months ago
ROX: Relational Over XML
An increasing percentage of the data needed by business applications is being generated in XML format. Storing the XML in its native format will facilitate new applications that e...
Alan Halverson, Vanja Josifovski, Guy M. Lohman, H...
111
Voted
WEBI
2004
Springer
15 years 9 months ago
Dynamic Resource Selection For Service Composition in The Grid
While numerous efforts have focused on service composition in the Grid environment, service selection among similar services from multiple providers has not been addressed. In par...
William Kwok-Wai Cheung, Jiming Liu, Kevin H. Tsan...