Sciweavers

1765 search results - page 175 / 353
» Combinations of Weak Classifiers
Sort
View
SECPERU
2006
IEEE
15 years 10 months ago
Using One-Way Chains to Provide Message Authentication without Shared Secrets
The objective of this paper is to propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret ...
Bogdan Groza
GECCO
2005
Springer
107views Optimization» more  GECCO 2005»
15 years 9 months ago
Investigating the success of spatial coevolution
We investigate the results of coevolution of spatially distributed populations. In particular, we describe work in which a simple function approximation problem is used to compare...
Nathan Williams, Melanie Mitchell
ICADL
2004
Springer
141views Education» more  ICADL 2004»
15 years 9 months ago
Exploiting Extended Service-Oriented Architecture for Federated Digital Libraries
In order to support various requirements from the user’s perspective, digital library (DL) systems may need to apply a large variety of services, such as query services for a spe...
Hao Ding, Ingeborg Sølvberg
ISSAC
2004
Springer
91views Mathematics» more  ISSAC 2004»
15 years 9 months ago
A poly-algorithmic approach to simplifying elementary functions
Simplification has been long recognised to be a fundamental problem within computer algebra[17]. However, even for the class of elementary functions, it has not been resolved in ...
James C. Beaumont, Russell J. Bradford, James H. D...
137
Voted
HICSS
2003
IEEE
159views Biometrics» more  HICSS 2003»
15 years 9 months ago
Emergent Structures in Supply Chains - A Study Integrating Agent-Based and System Dynamics Modeling
Supply chain management is a demanding and complicated task due to its broad scope and the strong connectedness of its objects and issues. In order to make theoretical investigati...
Nadine Schieritz, Andreas Größler