Sciweavers

10870 search results - page 1996 / 2174
» Model Checking Programs
Sort
View
FC
2005
Springer
83views Cryptology» more  FC 2005»
15 years 7 months ago
Secure Distributed Human Computation
We suggest a general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are e...
Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebi...
GECCO
2005
Springer
175views Optimization» more  GECCO 2005»
15 years 7 months ago
An approach for QoS-aware service composition based on genetic algorithms
Web services are rapidly changing the landscape of software engineering. One of the most interesting challenges introduced by web services is represented by Quality Of Service (Qo...
Gerardo Canfora, Massimiliano Di Penta, Raffaele E...
98
Voted
GECCO
2005
Springer
136views Optimization» more  GECCO 2005»
15 years 7 months ago
Evolutionary computation and the c-value paradox
The C-value Paradox is the name given in biology to the wide variance in and often very large amount of DNA in eukaryotic genomes and the poor correlation between DNA length and p...
Sean Luke
HIPEAC
2005
Springer
15 years 7 months ago
Garbage Collection Hints
This paper shows that Appel-style garbage collectors often make suboptimal decisions both in terms of when and how to collect. We argue that garbage collection should be done when ...
Dries Buytaert, Kris Venstermans, Lieven Eeckhout,...
ICALP
2005
Springer
15 years 7 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin
« Prev « First page 1996 / 2174 Last » Next »