Sciweavers

988 search results - page 78 / 198
» Pseudo-Genetic Algorithmic Composition
Sort
View
CSFW
1999
IEEE
15 years 2 months ago
I/O Automaton Models and Proofs for Shared-Key Communication Systems
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...
Nancy A. Lynch

Publication
241views
14 years 11 months ago
Fast compositing for cluster-parallel rendering
The image compositing stages in cluster-parallel rendering for gathering and combining partial rendering results into a final display frame are fundamentally limited by node-to-nod...
Maxim Makhinya, Stefan Eilemann, Renato Pajarola
SEC
2008
14 years 11 months ago
A Fuzzy Model for the Composition of Intrusion Detectors
The performance of an intrusion detector depends on several factors, like its internal architecture and the algorithms it uses. Thus, distinct detectors can behave distinctly when ...
Inez Raguenet, Carlos Maziero
MCS
2007
Springer
14 years 9 months ago
Elasto-plasticity model in structural optimization of composite materials with periodic microstructures
The paper deals with a structural optimization of composite materials with periodic microstructures invoking an elasto-plasticity model with the von Mises yield criterion. Closest...
Ronald H. W. Hoppe, Svetozara Petrova
TSC
2008
209views more  TSC 2008»
14 years 9 months ago
Effective Web Service Composition in Diverse and Large-Scale Service Networks
Web services are considered to be a potential silver bullet for the envisioned Service Oriented Architecture, in which loosely coupled software components are published, located, a...
Seog-Chan Oh, Dongwon Lee, Soundar R. T. Kumara