Sciweavers

1717 search results - page 256 / 344
» On the analysis of the (1 1) memetic algorithm
Sort
View
PKC
2004
Springer
151views Cryptology» more  PKC 2004»
15 years 3 months ago
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny
The isogeny for elliptic curve cryptosystems was initially used for the efficient improvement of order counting methods. Recently, Smart proposed the countermeasure using isogeny f...
Toru Akishita, Tsuyoshi Takagi
CSB
2003
IEEE
135views Bioinformatics» more  CSB 2003»
15 years 3 months ago
Stepping Up the Pace of Discovery: the Genomes to Life Program
Genomes to Life (GTL), the U.S. Department of Energy Office of Science’s systems biology program, focuses on environmental microbiology. Over the next 10 to 20 years, GTL’s ke...
Marvin Frazier, David Thomassen, Aristides Patrino...
MSWIM
2003
ACM
15 years 3 months ago
Simulation of large ad hoc networks
An ad hoc network is formed by wireless mobile nodes (hosts) that operate as terminals as well as routers in the network, without any centralized administration. Research in ad ho...
Valeriy Naoumov, Thomas R. Gross
ICNP
2002
IEEE
15 years 2 months ago
Incentive Engineering in Wireless LAN Based Access Networks
Traffic regulation in public and private wireless LANs face a number of significant challenges, particularly in commercial networks where there is a need for efficient regulati...
Raymond R.-F. Liao, Rita H. Wouhaybi, Andrew T. Ca...
WACV
2002
IEEE
15 years 2 months ago
Viewing Enhancement in Video-Endoscopy
Video-endoscopy (Figure 1), a mode of minimally invasive surgery, has proven to be significantly less invasive to the patient. However, it creates a much more complex operation env...
Dan Koppel, Yuan-Fang Wang, Hua Lee