Sciweavers

11573 search results - page 1991 / 2315
» Designing Relational Databases
Sort
View
CCS
2003
ACM
15 years 10 months ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
ESOP
2003
Springer
15 years 10 months ago
Modeling Web Interactions
Programmers confront a minefield when they design interactive Web programs. Web interactions take place via Web browsers. With browsers, consumers can whimsically navigate among t...
Paul T. Graunke, Robert Bruce Findler, Shriram Kri...
FPL
2003
Springer
164views Hardware» more  FPL 2003»
15 years 10 months ago
FPGA Implementations of the RC6 Block Cipher
RC6 is a symmetric-key algorithm which encrypts 128-bit plaintext blocks to 128-bit ciphertext blocks. The encryption process involves four operations: integer addition modulo 2w ,...
Jean-Luc Beuchat
GECCO
2003
Springer
100views Optimization» more  GECCO 2003»
15 years 10 months ago
Active Guidance for a Finless Rocket Using Neuroevolution
Finless rockets are more efficient than finned designs, but are too unstable to fly unassisted. These rockets require an active guidance system to control their orientation durin...
Faustino J. Gomez, Risto Miikkulainen
ICLP
2003
Springer
15 years 10 months ago
Computing Minimal Models, Stable Models, and Answer Sets
We propose and study algorithms for computing minimal models, stable models and answer sets of 2- and 3-CNF theories, and normal and disjunctive 2- and 3-programs. We are especiall...
Zbigniew Lonc, Miroslaw Truszczynski
« Prev « First page 1991 / 2315 Last » Next »