Sciweavers

2905 search results - page 383 / 581
» Formal Memetic Algorithms
Sort
View
RTA
2009
Springer
15 years 10 months ago
YAPA: A Generic Tool for Computing Intruder Knowledge
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
Mathieu Baudet, Véronique Cortier, St&eacut...
DATE
2008
IEEE
89views Hardware» more  DATE 2008»
15 years 10 months ago
EPIC: Ending Piracy of Integrated Circuits
As semiconductor manufacturing requires greater capital investments, the use of contract foundries has grown dramatically, increasing exposure to mask theft and unauthorized exces...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
ICIW
2008
IEEE
15 years 10 months ago
Different Approaches to Semantic Web Service Composition
—Semantic web service composition is about finding services from a repository that are able to accomplish a specified task if executed. The task is defined in a form of a comp...
Thomas Weise, Steffen Bleul, Diana Elena Comes, Ku...
CIDM
2007
IEEE
15 years 10 months ago
Mining Subspace Correlations
— In recent applications of clustering such as gene expression microarray analysis, collaborative filtering, and web mining, object similarity is no longer measured by physical ...
Rave Harpaz, Robert M. Haralick
NCA
2007
IEEE
15 years 10 months ago
Implementing Atomic Data through Indirect Learning in Dynamic Networks
Developing middleware services for dynamic distributed systems, e.g., ad-hoc networks, is a challenging task given that such services deal with dynamically changing membership and...
Kishori M. Konwar, Peter M. Musial, Nicolas C. Nic...