Sciweavers

3155 search results - page 515 / 631
» How Are You Doing
Sort
View
133
Voted
ESORICS
2003
Springer
15 years 10 months ago
Rapid Mixing and Security of Chaum's Visual Electronic Voting
Recently, David Chaum proposed an electronic voting scheme that combines visual cryptography and digital processing. It was designed to meet not only mathematical security standard...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
130
Voted
GECCO
2003
Springer
113views Optimization» more  GECCO 2003»
15 years 10 months ago
On the Locality of Representations
It is well known that using high-locality representations is important for efficient evolutionary search. This paper discusses how the locality of a representation influences the ...
Franz Rothlauf
EUROSYS
2010
ACM
15 years 10 months ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
15 years 10 months ago
An Ontology-Based HTML to XML Conversion Using Intelligent Agents
How to organize and classify large amounts of heterogeneous information accessible over the Internet is a major problem faced by industry, government, and military organizations. ...
Thomas E. Potok, Mark T. Elmore, Joel W. Reed, Nag...
ICDM
2002
IEEE
138views Data Mining» more  ICDM 2002»
15 years 10 months ago
Extraction Techniques for Mining Services from Web Sources
The Web has established itself as the dominant medium for doing electronic commerce. Consequently the number of service providers, both large and small, advertising their services...
Hasan Davulcu, Saikat Mukherjee, I. V. Ramakrishna...