Sciweavers

9732 search results - page 1804 / 1947
» Modelling Adaptivity with Aspects
Sort
View
EUROCRYPT
2000
Springer
15 years 8 months ago
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against adaptive chosen ciphertext attack provided the Decision...
Victor Shoup
ICSE
2000
IEEE-ACM
15 years 8 months ago
Software reliability and dependability: a roadmap
Software's increasing role creates both requirements for being able to trust it more than before, and for more people to know how much they can trust their software. A sound ...
Bev Littlewood, Lorenzo Strigini
INFOCOM
2000
IEEE
15 years 8 months ago
A Modular Approach to Packet Classification: Algorithms and Results
The ability to classify packets according to pre-defined rules is critical to providing many sophisticated value-added services, such as security, QoS, load balancing, traffic acco...
Thomas Y. C. Woo
LCPC
2000
Springer
15 years 8 months ago
SmartApps: An Application Centric Approach to High Performance Computing
State-of-the-art run-time systems are a poor match to diverse, dynamic distributed applications because they are designed to provide support to a wide variety of applications, with...
Lawrence Rauchwerger, Nancy M. Amato, Josep Torrel...
EPS
1995
Springer
15 years 8 months ago
PANIC: A Parallel Evolutionary Rule Based System
PANIC (Parallelism And Neural networks In Classifier systems) is a parallel system to evolve behavioral strategies codified by sets of rules. It integrates several adaptive techni...
Antonella Giani, Fabrizio Baiardi, Antonina Starit...
« Prev « First page 1804 / 1947 Last » Next »