Sciweavers

669 search results - page 68 / 134
» Mastering the Master Theorem
Sort
View
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 1 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
ISN
2000
Springer
151views Communications» more  ISN 2000»
15 years 1 months ago
Agent-Based Management
In logistics of today's economy we have to deal with distributed systems. To support the demanding management task the multi-agent approach offers promising perspectives. For ...
Andreas Kind
CG
2008
Springer
14 years 12 months ago
A Parallel Monte-Carlo Tree Search Algorithm
Monte-Carlo tree search is a powerful paradigm for the game of Go. We present a parallel Master-Slave algorithm for Monte-Carlo tree search. We experimented the algorithm on a netw...
Tristan Cazenave, Nicolas Jouandeau
FECS
2007
138views Education» more  FECS 2007»
14 years 11 months ago
Computing Branches Out: On Revitalizing Computing Education
Computing professionals are employed in so many different ways that it is difficult to even define the common foundation that all of them should master; however, a single degree ...
Ljubomir Perkovic, Amber Settle
IM
2007
14 years 11 months ago
Autonomic Management of Component-Based Embedded Software
Abstract— Software components embedded in ubiquitous systems, especially those using wireless networking, are subject to unpredictable behaviors inherent to using these systems i...
Fabien Romeo, Franck Barbier, Jean-Michel Bruel