Sciweavers

2863 search results - page 514 / 573
» Constructing minimum-interference networks
Sort
View
CCS
2006
ACM
15 years 5 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
DBISP2P
2006
Springer
71views Database» more  DBISP2P 2006»
15 years 5 months ago
Oscar: Small-World Overlay for Realistic Key Distributions
Abstract. The research on P2P systems which support skewed key distributions has rapidly advanced in the recent years. Yet, the assumptions on the skews we are dealing with remaine...
Sarunas Girdzijauskas, Anwitaman Datta, Karl Abere...
GECCO
2006
Springer
147views Optimization» more  GECCO 2006»
15 years 5 months ago
Deceptiveness and neutrality the ND family of fitness landscapes
When a considerable number of mutations have no effects on fitness values, the fitness landscape is said neutral. In order to study the interplay between neutrality, which exists ...
William Beaudoin, Sébastien Vérel, P...
AFRIGRAPH
2001
ACM
15 years 5 months ago
Experiences in porting a virtual reality system to Java
Practical experience in porting a large virtual reality system from C/C++ to Java indicates that porting this type of real-time application is both feasible, and has several merit...
Shaun Bangay
APCSAC
2000
IEEE
15 years 5 months ago
Dataflow Java: Implicitly Parallel Java
Dataflow computation models enable simpler and more efficient management of the memory hierarchy - a key barrier to the performance of many parallel programs. This paper describes...
Gareth Lee, John Morris