The security of the RSA public key cryptosystem depends on the intractability of the integer factoring problem. This paper shall give some theoretical support to the assumption of ...
In previous work, we showed how cooperative coevolution could be used to evolve both the feature construction stage and the classification stage of an object detection algorithm. ...
Today’s interfaces for time-scaled audio replay have limitations especially regarding highly interactive tasks such as skimming and searching, which require quick temporary spee...
In this paper we investigate the efficiency of the function field sieve to compute discrete logarithms in the finite fields F3n . Motivated by attacks on identity based encrypti...
Robert Granger, Andrew J. Holt, Dan Page, Nigel P....
In the paper we study the dynamics of roles played by agents in multiagent systems. We capture role dynamics in terms of four operation performed by agents: ‘enactment’, ‘dea...
Mehdi Dastani, Birna van Riemsdijk, Joris Hulstijn...