Sciweavers

7489 search results - page 1417 / 1498
» Challenges for biologically-inspired computing
Sort
View
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 3 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
DILS
2005
Springer
15 years 3 months ago
PLATCOM: Current Status and Plan for the Next Stages
We have been developing a system for comparing multiple genomes, PLATCOM, where users can choose genomes of their choice freely and perform analysis of the selected genomes with a...
Kwangmin Choi, Jeong-Hyeon Choi, Amit Saple, Zhipi...
EWSA
2005
Springer
15 years 3 months ago
Architecture Description for Mobile Distributed Systems
Abstract. In this paper we motivate an Architecture Description Language (ADL) for mobile distributed systems based on the π-calculus. Different from other approaches, the non-fu...
Volker Gruhn, Clemens Schäfer
GD
2005
Springer
15 years 3 months ago
D-Dupe: An Interactive Tool for Entity Resolution in Social Networks
Visualizing and analyzing social networks is a challenging problem that has been receiving growing attention. An important first step, before analysis can begin, is ensuring that...
Mustafa Bilgic, Louis Licamele, Lise Getoor, Ben S...
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 3 months ago
Evolutionary testing of state-based programs
The application of Evolutionary Algorithms to structural test data generation, known as Evolutionary Testing, has to date largely focused on programs with input-output behavior. H...
Phil McMinn, Mike Holcombe
« Prev « First page 1417 / 1498 Last » Next »