Sciweavers

3040 search results - page 215 / 608
» Independent Natural Extension
Sort
View
CRYPTO
1999
Springer
109views Cryptology» more  CRYPTO 1999»
15 years 5 months ago
Coding Constructions for Blacklisting Problems without Computational Assumptions
Abstract. We consider the broadcast exclusion problem: how to transmit a message over a broadcast channel shared by N = 2n users so that all but some specified coalition of k excl...
Ravi Kumar, Sridhar Rajagopalan, Amit Sahai
118
Voted
FDL
2004
IEEE
15 years 4 months ago
UML System-Level Analysis and Design of Secure Communication Schemes for Embedded Systems
In this work we develop a secure communication protocol in the context of a Remote Meter Reading (RMR) System. We first analyze existing standards in secure communication (e.g. IP...
Mauro Prevostini, Giuseppe Piscopo, I. Stefanini
113
Voted
UML
1997
Springer
15 years 4 months ago
Evaluation of Object-Oriented Modelling Languages: A Comparison Between OML and UML
The following article is motivated by the current efforts of the Object Management Group (OMG) to standardize object-oriented modelling languages. In the face of the great economi...
Michael Prasse
108
Voted
CSC
2006
15 years 2 months ago
A New Migration Model For Distributed Genetic Algorithms
Genetic algorithms are heuristic search algorithm used in science, engineering and many other areas. They are powerful but slow because of their evolutionary nature that mimics th...
Taisir Eldos
96
Voted
IJCAI
1993
15 years 2 months ago
Statistical Foundations for Default Reasoning
We describe a new approach to default reasoning, based on a principle of indi erence among possible worlds. We interpret default rules as extreme statistical statements, thus obta...
Fahiem Bacchus, Adam J. Grove, Joseph Y. Halpern, ...