Sciweavers

2120 search results - page 370 / 424
» Mapping the Gnutella Network
Sort
View
98
Voted
ESORICS
2007
Springer
15 years 6 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
GECCO
2007
Springer
172views Optimization» more  GECCO 2007»
15 years 6 months ago
Acquiring evolvability through adaptive representations
Adaptive representations allow evolution to explore the space of phenotypes by choosing the most suitable set of genotypic parameters. Although such an approach is believed to be ...
Joseph Reisinger, Risto Miikkulainen
101
Voted
HIPC
2007
Springer
15 years 6 months ago
Distributed Ranked Search
P2P deployments are a natural infrastructure for building distributed search networks. Proposed systems support locating and retrieving all results, but lack the information necess...
Vijay Gopalakrishnan, Ruggero Morselli, Bobby Bhat...
ICANN
2007
Springer
15 years 6 months ago
Sparse Least Squares Support Vector Regressors Trained in the Reduced Empirical Feature Space
Abstract. In this paper we discuss sparse least squares support vector regressors (sparse LS SVRs) defined in the reduced empirical feature space, which is a subspace of mapped tr...
Shigeo Abe, Kenta Onishi
136
Voted
UIC
2007
Springer
15 years 6 months ago
Location-Based Recommendation System Using Bayesian User's Preference Model in Mobile Devices
As wireless communication advances, research on location-based services using mobile devices has attracted interest, which provides information and services related to user’s phy...
Moon-Hee Park, Jin-Hyuk Hong, Sung-Bae Cho