Sciweavers

43190 search results - page 8507 / 8638
» Can Development Be Designed
Sort
View
EUROCRYPT
2010
Springer
15 years 9 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
GECCO
2010
Springer
191views Optimization» more  GECCO 2010»
15 years 9 months ago
Mirrored variants of the (1, 4)-CMA-ES compared on the noisy BBOB-2010 testbed
Derandomization by means of mirrored samples has been recently introduced to enhance the performances of (1, λ)and (1 + 2)-Evolution-Strategies (ESs) with the aim of designing fa...
Anne Auger, Dimo Brockhoff, Nikolaus Hansen
CDC
2009
IEEE
176views Control Systems» more  CDC 2009»
15 years 9 months ago
Controllability of the rotation of a quantum planar molecule
Abstract— We consider the simplest model for controlling the rotation of a molecule by the action of an electric field, namely a quantum planar pendulum. This problem consists i...
Ugo V. Boscain, Thomas Chambrion, Paolo Mason, Mar...
COLCOM
2009
IEEE
15 years 9 months ago
Efficient dissemination of personalized video content in resource-constrained environments
— Video streaming on mobile devices such as PDA’s, laptop PCs, pocket PCs and cell phones is becoming increasingly popular. These mobile devices are typically constrained by th...
Piyush Parate, Lakshmish Ramaswamy, Suchendra M. B...
SC
2009
ACM
15 years 9 months ago
GPU based sparse grid technique for solving multidimensional options pricing PDEs
It has been shown that the sparse grid combination technique can be a practical tool to solve high dimensional PDEs arising in multidimensional option pricing problems in finance...
Abhijeet Gaikwad, Ioane Muni Toke
« Prev « First page 8507 / 8638 Last » Next »