Sciweavers

6770 search results - page 449 / 1354
» How GPUs Work
Sort
View
124
Voted
PROVSEC
2007
Springer
15 years 11 months ago
On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers
Security of a modern block cipher is commonly measured in terms of its resistance to known attacks. While the provable security approach to block ciphers dates back to the first C...
Ermaliza Razali, Raphael C.-W. Phan, Marc Joye
RR
2007
Springer
15 years 11 months ago
Web Services Discovery and Constraints Composition
The most promising feature of the Web services platform is its ability to form new (composite) services by combining the capabilities of already existing (component) services. The ...
Debmalya Biswas
127
Voted
WER
2007
Springer
15 years 11 months ago
Evaluating ADELFE Methodology in the Requirements Identification
The increasing use of multi-agent systems brings challenges that have not been studied yet, such as how should we adapt requirements elicitation to cope with agent properties like...
Vera Werneck, A. Y. Kano, Luiz Marcio Cysneiros
WINE
2007
Springer
166views Economy» more  WINE 2007»
15 years 11 months ago
Gradient-Based Algorithms for Finding Nash Equilibria in Extensive Form Games
We present a computational approach to the saddle-point formulation for the Nash equilibria of two-person, zero-sum sequential games of imperfect information. The algorithm is a ...
Andrew Gilpin, Samid Hoda, Javier Peña, Tuo...
WSFM
2007
Springer
15 years 11 months ago
Towards a Theory of Web Service Choreographies
A fundamental promise of service oriented architecture (SOA) lies in the ease of integrating sharable information, processes, and other resources through interactions among the sha...
Jianwen Su, Tevfik Bultan, Xiang Fu, Xiangpeng Zha...