Sciweavers

7253 search results - page 1061 / 1451
» Agile Performance Testing
Sort
View
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 10 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
GECCO
2005
Springer
156views Optimization» more  GECCO 2005»
15 years 10 months ago
The blob code is competitive with edge-sets in genetic algorithms for the minimum routing cost spanning tree problem
Among the many codings of spanning trees for evolutionary search are those based on bijections between Pr¨ufer strings—strings of n−2 vertex labels—and spanning trees on th...
Bryant A. Julstrom
CSCW
2004
ACM
15 years 10 months ago
Physiological indicators for the evaluation of co-located collaborative play
Emerging technologies offer new ways of using entertainment technology to foster interactions between players and connect people. Evaluating collaborative entertainment technology...
Regan L. Mandryk, Kori M. Inkpen
PADS
2004
ACM
15 years 10 months ago
The Effect of Detail on Ethernet Simulation
An important question for network simulation is what level of detail is required to obtain a desired level of accuracy. While in some networks, the level of detail is an open rese...
Alefiya Hussain, Aman Kapoor, John S. Heidemann
PLDI
2004
ACM
15 years 10 months ago
The set constraint/CFL reachability connection in practice
Many program analyses can be reduced to graph reachability problems involving a limited form of context-free language reachability called Dyck-CFL reachability. We show a new redu...
John Kodumal, Alexander Aiken
« Prev « First page 1061 / 1451 Last » Next »