Sciweavers

4072 search results - page 353 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
ASIACRYPT
2008
Springer
15 years 7 months ago
Chosen Ciphertext Security with Optimal Ciphertext Overhead
Every public-key encryption scheme has to incorporate a certain amount of randomness into its ciphertexts to provide semantic security against chosen ciphertext attacks (IND-CCA). ...
Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto
GECCO
2008
Springer
135views Optimization» more  GECCO 2008»
15 years 6 months ago
Agent-based support for interactive search in conceptual software engineering design
While recent attempts to search a conceptual software engineering design search space with multi-objective evolutionary algorithms have yielded promising results, the practical ap...
Christopher L. Simons, Ian C. Parmee
142
Voted
IJACTAICIT
2010
123views more  IJACTAICIT 2010»
15 years 2 months ago
A Hybrid Fault-Proneness Detection Approach Using Text Filtering and Static Code Analysis
We have proposed a fault-prone software module detection method using text-filtering approach, called Fault-proneness filtering. Even though the fault-proneness filtering achieved...
Osamu Mizuno, Hideaki Hata
ICCAD
2005
IEEE
108views Hardware» more  ICCAD 2005»
16 years 1 months ago
A routing algorithm for flip-chip design
— The flip-chip package gives the highest chip density of any packaging method to support the pad-limited Application-Specific Integrated Circuit (ASIC) designs. In this paper,...
Jia-Wei Fang, I-Jye Lin, Ping-Hung Yuh, Yao-Wen Ch...
244
Voted
TWC
2010
14 years 11 months ago
MMSE Based Transceiver Designs in Closed-Loop Non-Regenerative MIMO Relaying Systems
In this paper, we propose a new design strategy based on the minimum mean-squared error (MMSE) in closedloop non-regenerative multiple-input multiple-output (MIMO) relaying system...
Chang-Ick Song, Kyoung-Jae Lee, Inkyu Lee