Sciweavers

5684 search results - page 296 / 1137
» Computing with active dendrites
Sort
View
AICOM
2002
103views more  AICOM 2002»
15 years 4 months ago
The emergent computational potential of evolving artificial living systems
The computational potential of artificial living systems can be studied without knowing the algorithms that govern their behavior. Modeling single organisms by means of socalled c...
Jirí Wiedermann, Jan van Leeuwen
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
16 years 5 months ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...
CCS
2009
ACM
15 years 11 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
ICCS
2009
Springer
15 years 11 months ago
Balancing Scientist Needs and Volunteer Preferences in Volunteer Computing Using Constraint Optimization
BOINC is a middleware for Volunteer Computing. In BOINC projects, heterogeneous resources distributed across the Internet are used for large-scale scientific simulations. The larg...
James Atlas, Trilce Estrada, Keith Decker, Michela...
AINA
2007
IEEE
15 years 11 months ago
Un-biasing the Link Farm Effect in PageRank Computation
Link analysis is a critical component of current Internet search engines' results ranking software, which determines the ordering of query results returned to the user. The o...
Arnon Rungsawang, Komthorn Puntumapon, Bundit Mana...