Sciweavers

2208 search results - page 248 / 442
» Memory Practices in the Sciences
Sort
View
PKC
2010
Springer
161views Cryptology» more  PKC 2010»
15 years 1 months ago
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
ded abstract of this paper appears in 13th International Conference on Practice and Theory in Public Key Cryptography (PKC) 2010, Lecture Notes in Computer Science Vol. ?, P. Nguye...
Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Vi...
ESE
2008
88views Database» more  ESE 2008»
14 years 11 months ago
Cooperative method development
The development of methods tools and process improvements is best to be based on the understanding of the development practice to be supported. Qualitative research has been propo...
Yvonne Dittrich, Kari Rönkkö, Jeanette E...
IPL
2002
65views more  IPL 2002»
14 years 10 months ago
Parallel evolutionary algorithms can achieve super-linear performance
One of the main reasons for using parallel evolutionary algorithms (PEAs) is to obtain efficient algorithms with an execution time much lower than that of their sequential counter...
Enrique Alba
MP
1998
76views more  MP 1998»
14 years 10 months ago
Warm start of the primal-dual method applied in the cutting-plane scheme
A practical warm-start procedure is described for the infeasible primal-dualinterior-point method employed to solve the restricted master problem within the cutting-plane method. ...
Jacek Gondzio
TSMC
2002
137views more  TSMC 2002»
14 years 10 months ago
An evolutionary tabu search for cell image segmentation
Many problems in practically all fields of science, engineering and technology involve global optimization. It becomes more and more important to develop the efficient global opti...
Tianzi Jiang, Faguo Yang