Sciweavers

2747 search results - page 326 / 550
» Non-oblivious Strategy Improvement
Sort
View
SMALLTALK
2007
Springer
15 years 5 months ago
Encapsulating and exploiting change with changeboxes
Real world software systems change continuously to meet new demands. Most programming languages and development environments, however, are more concerned with limiting the effects...
Marcus Denker, Tudor Gîrba, Adrian Lienhard,...
ACSAC
2006
IEEE
15 years 5 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz
ASAP
2006
IEEE
110views Hardware» more  ASAP 2006»
15 years 5 months ago
Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards
This paper proposes different low-cost coprocessors for public key authentication on 8-bit smart cards. Elliptic curve cryptography is used for its efficiency per bit of key and ...
Guerric Meurice de Dormale, Renaud Ambroise, David...
CCGRID
2006
IEEE
15 years 5 months ago
Exploit Failure Prediction for Adaptive Fault-Tolerance in Cluster Computing
As the scale of cluster computing grows, it is becoming hard for long-running applications to complete without facing failures on large-scale clusters. To address this issue, chec...
Yawei Li, Zhiling Lan
FOCS
2006
IEEE
15 years 5 months ago
Generalization of Binary Search: Searching in Trees and Forest-Like Partial Orders
We extend the binary search technique to searching in trees. We consider two models of queries: questions about vertices and questions about edges. We present a general approach t...
Krzysztof Onak, Pawel Parys