Sciweavers

206 search results - page 25 / 42
» Sharing in the Weak Lambda-Calculus
Sort
View
96
Voted
DASFAA
2010
IEEE
294views Database» more  DASFAA 2010»
15 years 7 months ago
A Shoes-Integrated Sensing System for Context-Aware Human Probes
Human Probes, which are human integrated or embedded with sensors, allow the acquisition of a variety of contextual information, facilitate collaborative information sharing and co...
Kazumasa Oshima, Yasuyuki Ishida, Shin'ichi Konomi...
91
Voted
EVOW
2010
Springer
15 years 7 months ago
Enhancing Genetic Algorithms by a Trie-Based Complete Solution Archive
Genetic algorithms (GAs) share a common weakness with most other metaheuristics: Candidate solutions are in general revisited multiple times, lowering diversity and wasting preciou...
Günther R. Raidl, Bin Hu
NTMS
2009
IEEE
15 years 7 months ago
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements
—New approaches that generate secret keys from radio channel characteristics have been recently proposed. The security of these schemes usually relies on the reciprocity principl...
Sana Tmar Ben Hamida, Jean-Benoît Pierrot, C...
126
Voted
ICCSA
2007
Springer
15 years 6 months ago
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secre...
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...
IPPS
2006
IEEE
15 years 6 months ago
Checkpointing and rollback-recovery protocol for mobile systems with MW session guarantee
In the mobile environment, weak consistency replication of shared data is the key to obtaining high data availability, good access performance, and good scalability. Therefore new...
Jerzy Brzezinski, Anna Kobusinska, Michal Szychowi...