Sciweavers

8636 search results - page 1300 / 1728
» How Developers Copy
Sort
View
157
Voted
EUROCRYPT
2010
Springer
15 years 10 months ago
Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
We develop an abstract framework that encompasses the key properties of bilinear groups of composite order that are required to construct secure pairing-based cryptosystems, and we...
David Mandell Freeman
166
Voted
GECCO
2010
Springer
162views Optimization» more  GECCO 2010»
15 years 10 months ago
Heuristics for sampling repetitions in noisy landscapes with fitness caching
For many large-scale combinatorial search/optimization problems, meta-heuristic algorithms face noisy objective functions, coupled with computationally expensive evaluation times....
Forrest Stonedahl, Susa H. Stonedahl
174
Voted
KR
2010
Springer
15 years 10 months ago
I Don't Want to Think About it Now: Decision Theory with Costly Computation
Computation plays a major role in decision making. Even if an agent is willing to ascribe a probability to all states and a utility to all outcomes, and maximize expected utility,...
Joseph Y. Halpern
MPC
2010
Springer
147views Mathematics» more  MPC 2010»
15 years 10 months ago
Designing an Algorithmic Proof of the Two-Squares Theorem
We show a new and constructive proof of the two-squares theorem, based on a somewhat unusual, but very effective, way of rewriting the so-called extended Euclid’s algorithm. Rat...
João F. Ferreira
133
Voted
C5
2009
IEEE
15 years 9 months ago
The PresenceDetector: Context Awareness for Collaboration
In this paper we introduce a concept of how the status of project partners in a virtual collaboration environment can be transferred in a subtle manner to gain useful information ...
Moritz Kemper, Constanze Langer, Christine Strotho...
« Prev « First page 1300 / 1728 Last » Next »