Sciweavers

12981 search results - page 2277 / 2597
» Model Checking (Abstract)
Sort
View
FC
2005
Springer
133views Cryptology» more  FC 2005»
15 years 10 months ago
RFID Traceability: A Multilayer Problem
Abstract. RFID tags have very promising applications in many domains (retail, rental, surveillance, medicine to name a few). Unfortunately the use of these tags can have serious im...
Gildas Avoine, Philippe Oechslin
GECCO
2005
Springer
166views Optimization» more  GECCO 2005»
15 years 10 months ago
The emulation of social institutions as a method of coevolution
This paper offers a novel approach to coevolution based on the sociological theory of symbolic interactionism. It provides a multi-agent computational model along with experimenta...
Deborah Vakas Duong, John J. Grefenstette
HPCC
2005
Springer
15 years 10 months ago
Fast Sparse Matrix-Vector Multiplication by Exploiting Variable Block Structure
Abstract. We improve the performance of sparse matrix-vector multiplication (SpMV) on modern cache-based superscalar machines when the matrix structure consists of multiple, irregu...
Richard W. Vuduc, Hyun-Jin Moon
IBPRIA
2005
Springer
15 years 10 months ago
Gabor Parameter Selection for Local Feature Detection
Abstract. Some recent works have addressed the object recognition problem by representing objects as the composition of independent image parts, where each part is modeled with “...
Plinio Moreno, Alexandre Bernardino, José S...
ICALP
2005
Springer
15 years 10 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin
« Prev « First page 2277 / 2597 Last » Next »