Sciweavers

988 search results - page 77 / 198
» Pseudo-Genetic Algorithmic Composition
Sort
View
SYNASC
2007
IEEE
134views Algorithms» more  SYNASC 2007»
15 years 4 months ago
Building Agent-Based Simulations Using Structural and Process Mental Models
This paper provides a design rationale for a mechanism that enforces a correct mapping between a model of a nested agent organization and a model of a composite interaction-based ...
Marco Stuit, Nick B. Szirbik, Hans Wortmann
COMPSAC
2006
IEEE
15 years 4 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale
CRYPTO
2004
Springer
139views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
How to Compress Rabin Ciphertexts and Signatures (and More)
Ordinarily, RSA and Rabin ciphertexts and signatures are log N bits, where N is a composite modulus; here, we describe how to “compress” Rabin ciphertexts and signatures (among...
Craig Gentry
SAINT
2003
IEEE
15 years 3 months ago
Planning For Web Services the Hard Way
In this paper we outline a framework for performing automated discovery, composition and execution of web services based solely on the information available in interface descripti...
Mark James Carman, Luciano Serafini
ASIACRYPT
2000
Springer
15 years 2 months ago
Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three
The paper shows that some of elliptic curves over finite fields of characteristic three of composite degree are attacked by a more effective algorithm than Pollard’s ρ method...
Seigo Arita