Sciweavers

4781 search results - page 680 / 957
» Complexity at large
Sort
View
91
Voted
GECCO
2006
Springer
174views Optimization» more  GECCO 2006»
15 years 4 months ago
On the analysis of the (1+1) memetic algorithm
Memetic algorithms are evolutionary algorithms incorporating local search to increase exploitation. This hybridization has been fruitful in countless applications. However, theory...
Dirk Sudholt
114
Voted
ACSAC
2001
IEEE
15 years 4 months ago
Information Flow Analysis of Component-Structured Applications
Software component technology facilitates the costeffective development of specialized applications. Nevertheless, due to the high number of principals involved in a component-str...
Peter Herrmann
ADBIS
2003
Springer
204views Database» more  ADBIS 2003»
15 years 4 months ago
Hierarchical Bitmap Index: An Efficient and Scalable Indexing Technique for Set-Valued Attributes
Abstract. Set-valued attributes are convenient to model complex objects occurring in the real world. Currently available database systems support the storage of set-valued attribut...
Mikolaj Morzy, Tadeusz Morzy, Alexandros Nanopoulo...
101
Voted
ASIACRYPT
2001
Springer
15 years 4 months ago
Efficient Traitor Tracing Algorithms Using List Decoding
Abstract. We use powerful new techniques for list decoding errorcorrecting codes to efficiently trace traitors. Although much work has focused on constructing traceability schemes,...
Alice Silverberg, Jessica Staddon, Judy L. Walker
108
Voted
CIA
2000
Springer
15 years 4 months ago
Emergent Societies of Information Agents
In the near future, billions of entities will be connected to each other through the Internet. The current trend is that an increasingly number of entities, from smart personal dev...
Paul Davidsson