Sciweavers

8196 search results - page 1284 / 1640
» Computational Modeling and Complexity Science
Sort
View
ICALP
2003
Springer
15 years 10 months ago
Analysis of a Simple Evolutionary Algorithm for Minimization in Euclidean Spaces
Although evolutionary algorithms (EAs) are widely used in practical optimization, their theoretical analysis is still in its infancy. Up to now results on the (expected) runtime ar...
Jens Jägersküpper
CSE
2009
IEEE
15 years 9 months ago
Quantifying Utility and Trustworthiness for Advice Shared on Online Social Media
—The growing popularity of social media in recent years has resulted in the creation of an enormous amount of user-developed content. While information is readily available, ther...
Sai T. Moturu, Jian Yang, Huan Liu
CRYPTO
1998
Springer
117views Cryptology» more  CRYPTO 1998»
15 years 9 months ago
Relations Among Notions of Security for Public-Key Encryption Schemes
ded abstract of this paper appears in Advances in Cryptology { Crypto 98 Proceedings, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998. This is t...
Mihir Bellare, Anand Desai, David Pointcheval, Phi...
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
15 years 8 months ago
Language communities in enterprise architecture research
As a result of the rigor vs. relevance debate, researchers who focus on design research on organizational problems are beginning to focus on their research methodology’s rigor. ...
Joachim Schelp, Robert Winter
AAAI
2007
15 years 7 months ago
An Intelligent System for Chinese Calligraphy
Our work links Chinese calligraphy to computer science through an integrated intelligence approach. We first extract strokes of existent calligraphy using a semi-automatic, twoph...
Songhua Xu, Hao Jiang, Francis Chi-Moon Lau, Yunhe...
« Prev « First page 1284 / 1640 Last » Next »