Sciweavers

9405 search results - page 1735 / 1881
» Computing a Model of Set Theory
Sort
View
ICALP
2005
Springer
15 years 9 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin
ICCS
2005
Springer
15 years 9 months ago
Phylogenetic Networks, Trees, and Clusters
Phylogenetic networks model evolutionary histories in the presence of non-treelike events such as hybrid speciation and horizontal gene transfer. In spite of their widely acknowled...
Luay Nakhleh, Li-San Wang
ICCS
2004
Springer
15 years 9 months ago
Demonstrating Wireless IPv6 Access to a Federated Health Record Server
: This paper describes the practical implementation of a federated health record server based on a generic and comprehensive architecture, deployed in a live clinical setting and a...
Dipak Kalra, David Ingram, A. Austin, V. Griffith,...
ICMI
2004
Springer
183views Biometrics» more  ICMI 2004»
15 years 9 months ago
Agent and library augmented shared knowledge areas (ALASKA)
This paper reports on an NSF-funded effort now underway to integrate three learning technologies that have emerged and matured over the past decade; each has presented compelling ...
Eric R. Hamilton
SIGADA
2004
Springer
15 years 9 months ago
Comparative analysis of genetic algorithm implementations
Genetic Algorithms provide computational procedures that are modeled on natural genetic system mechanics, whereby a coded solution is “evolved” from a set of potential solutio...
Robert Soricone, Melvin Neville
« Prev « First page 1735 / 1881 Last » Next »