Sciweavers

13476 search results - page 2630 / 2696
» Learning from Streams
Sort
View
121
Voted
ASIACRYPT
2007
Springer
15 years 9 months ago
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Spring...
Matthew Green, Susan Hohenberger
129
Voted
ECTEL
2007
Springer
15 years 9 months ago
Reflections on Digital Literacy
Parallel to the societal diffusion of digital technologies, the debate on their impacts and requirements has created terms like ICT literacy, digital literacy or digital competenc...
Harald Gapski
129
Voted
GECCO
2007
Springer
235views Optimization» more  GECCO 2007»
15 years 9 months ago
Expensive optimization, uncertain environment: an EA-based solution
Real life optimization problems often require finding optimal solution to complex high dimensional, multimodal problems involving computationally very expensive fitness function e...
Maumita Bhattacharya
125
Voted
GECCO
2007
Springer
179views Optimization» more  GECCO 2007»
15 years 9 months ago
A destructive evolutionary process: a pilot implementation
This paper describes the application of evolutionary search to the problem of Flash memory wear-out. The operating parameters of Flash memory are notoriously difficult to determin...
Joe Sullivan, Conor Ryan
141
Voted
LCPC
2007
Springer
15 years 9 months ago
Modeling Relations between Inputs and Dynamic Behavior for General Programs
Program dynamic optimization, adaptive to runtime behavior changes, has become increasingly important for both performance and energy savings. However, most runtime optimizations o...
Xipeng Shen, Feng Mao
« Prev « First page 2630 / 2696 Last » Next »