Sciweavers

4298 search results - page 151 / 860
» Computing at the top of the world
Sort
View
NSPW
2004
ACM
15 years 7 months ago
Symmetric behavior-based trust: a new paradigm for internet computing
Current models of Internet Computing are highly asymmetric – a host protects itself from malicious mobile Java programs, but there is no way to get assurances about the behavior...
Vivek Haldar, Michael Franz
131
Voted
PPSN
2004
Springer
15 years 7 months ago
Phase Transition Properties of Clustered Travelling Salesman Problem Instances Generated with Evolutionary Computation
Abstract. This paper introduces a generator that creates problem instances for the Euclidean symmetric travelling salesman problem. To fit real world problems, we look at maps con...
Jano I. van Hemert, Neil Urquhart
HICSS
2000
IEEE
208views Biometrics» more  HICSS 2000»
15 years 6 months ago
Transfer Capability Computations in Deregulated Power Systems
With the recent trend towards deregulating power systems around the world, transfer capability computation emerges as the key issue to a smoothly running power market with multipl...
Mohamed Shaaban, Yixin Ni, Felix F. Wu
STACS
1999
Springer
15 years 6 months ago
One-sided Versus Two-sided Error in Probabilistic Computation
We demonstrate how to use Lautemann's proof that BPP is in p 2 to exhibit that BPP is in RPPromiseRP. Immediate consequences show that if PromiseRP is easy or if there exist q...
Harry Buhrman, Lance Fortnow
CAISE
2006
Springer
15 years 5 months ago
Computers under Attacks!
The war metaphor seems to establish itself as soon as we deal with computer viruses. The concept of war is a central topic of political philosophy. The relationships between "...
Anne Bonfante, Jean-Yves Marion