Sciweavers

9359 search results - page 243 / 1872
» Generalization Algorithms for Second-Order Terms
Sort
View
IDTRUST
2009
ACM
15 years 12 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
GECCO
2007
Springer
153views Optimization» more  GECCO 2007»
15 years 11 months ago
Analyzing the effects of module encapsulation on search space bias
Modularity is thought to improve the evolvability of biological systems [18, 22]. Recent studies in the field of evolutionary computation show that the use of modularity improves...
Ozlem O. Garibay, Annie S. Wu
139
Voted
GLVLSI
2006
IEEE
98views VLSI» more  GLVLSI 2006»
15 years 11 months ago
Rapid intermodulation distortion estimation in fully balanced weakly nonlinear Gm-C filters using state-space modeling
State-space modeling of fully differential Gm-C filters with weak nonlinearities is used to develop a fast algorithm for intermodulation distortion estimation. It results in sim...
Paul Sotiriadis, Abdullah Celik, Zhaonian Zhang
ATAL
2005
Springer
15 years 10 months ago
Efficient information retrieval using mobile agents
We are concerned with the use of Mobile Agents for information retrieval. A multi-agent system is considered; a number of agents are involved in a collective effort to retrieve di...
Irene Sygkouna, Miltiades E. Anagnostou
102
Voted
GECCO
2005
Springer
15 years 10 months ago
New topologies for genetic search space
We propose three distance measures for genetic search space. One is a distance measure in the population space that is useful for understanding the working mechanism of genetic al...
Yong-Hyuk Kim, Byung Ro Moon