Sciweavers

14244 search results - page 2681 / 2849
» Modeling Program Predictability
Sort
View
94
Voted
SIGADA
2004
Springer
15 years 3 months ago
Comparative analysis of genetic algorithm implementations
Genetic Algorithms provide computational procedures that are modeled on natural genetic system mechanics, whereby a coded solution is “evolved” from a set of potential solutio...
Robert Soricone, Melvin Neville
93
Voted
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 3 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
115
Voted
WCW
2004
Springer
15 years 3 months ago
Dynamic Content Placement for Mobile Content Distribution Networks
As wireless networks increase in popularity, the development of efficient content distribution techniques to meet the growing and constantly changing client demand becomes a necess...
Wagner Moro Aioffi, Geraldo Robson Mateus, Jussara...
67
Voted
BIBE
2003
IEEE
15 years 3 months ago
Requirements of Phylogenetic Databases
We examine the organizational impact on phylogenetic databases of the increasing sophistication in the need and use of phylogenetic data. A primary issue is the use of the unnorma...
Luay Nakhleh, Daniel P. Miranker, François ...
82
Voted
DEXAW
2003
IEEE
108views Database» more  DEXAW 2003»
15 years 3 months ago
A Protocol for Programmable Smart Cards
This paper presents an open protocol for interoperability across multi-vendor programmable smart cards. It allows exposition of on-card storage and cryptographic services to host ...
Tommaso Cucinotta, Marco Di Natale, David Corcoran
« Prev « First page 2681 / 2849 Last » Next »