Sciweavers

2674 search results - page 445 / 535
» Implementation issues for an interactive evolutionary comput...
Sort
View
140
Voted
DAGSTUHL
2007
15 years 5 months ago
QUAD: Overview and Recent Developments
We give an outline of the specification and provable security features of the QUAD stream cipher proposed at Eurocrypt 2006 [6]. The cipher relies on the iteration of a multivaria...
David Arditti, Côme Berbain, Olivier Billet,...
124
Voted
ACE
2004
224views Education» more  ACE 2004»
15 years 5 months ago
Automating the Estimation of Project Size from Software Design Tools Using Modified Function Points
Final year students in the Bachelor of Computing complete an industry project where they work in teams to build an IT system for an external client. Grading projects in these circ...
Jason Ceddia, Martin Dick
168
Voted
CCS
2008
ACM
15 years 4 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar
120
Voted
CGF
2006
132views more  CGF 2006»
15 years 3 months ago
Verification of Physically Based Rendering Algorithms
Within computer graphics, the field of predictive rendering is concerned with those methods of image synthesis which yield results that do not only look real, but are also radiome...
Christiane Ulbricht, Alexander Wilkie, Werner Purg...
106
Voted
JCP
2006
85views more  JCP 2006»
15 years 3 months ago
A Constructive Meta-Level Feature Selection Method based on Method Repositories
Feature selection is one of key issues related with data pre-processing of classification task in a data mining process. Although many efforts have been done to improve typical fea...
Hidenao Abe, Takahira Yamaguchi