Sciweavers

5344 search results - page 330 / 1069
» Privacy-Preserving Set Operations
Sort
View
GECCO
2005
Springer
110views Optimization» more  GECCO 2005»
15 years 10 months ago
A genetic algorithm encoding for a class of cardinality constraints
A genetic algorithm encoding is proposed which is able to automatically satisfy a class of important cardinality constraints where the set of distinct values of the design variabl...
Helio J. C. Barbosa, Afonso C. C. Lemonge
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 10 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
143
Voted
MMB
2001
Springer
131views Communications» more  MMB 2001»
15 years 9 months ago
Seawind: a Wireless Network Emulator
Behavior of current communication protocols as well as current and future networked applications is of fundamental importance for technical and commercial success of Mobile Intern...
Markku Kojo, Andrei Gurtov, Jukka Manner, Pasi Sar...
122
Voted
STOC
1998
ACM
125views Algorithms» more  STOC 1998»
15 years 8 months ago
Spot-Checkers
On Labor Day weekend, the highway patrol sets up spot-checks at random points on the freeways with the intention of deterring a large fraction of motorists from driving incorrectl...
Funda Ergün, Sampath Kannan, Ravi Kumar, Roni...
143
Voted
ICSE
2010
IEEE-ACM
15 years 8 months ago
Code bubbles: rethinking the user interface paradigm of integrated development environments
Today’s integrated development environments (IDEs) are hampered by their dependence on files and file-based editing. We propose a novel user interface that is based on collectio...
Andrew Bragdon, Steven P. Reiss, Robert C. Zelezni...