Sciweavers

11949 search results - page 2116 / 2390
» Some results on (a:b)-choosability
Sort
View
145
Voted
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
15 years 8 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
ERCIMDL
2009
Springer
139views Education» more  ERCIMDL 2009»
15 years 8 months ago
Geographic Information Retrieval and Digital Libraries
In this demonstration we will examine the effectiveness of Geographic Information Retrieval (GIR) methods in digital library interfaces. We will show how various types of informat...
Ray R. Larson
110
Voted
GECCO
2009
Springer
15 years 8 months ago
Dynamic evolutionary optimisation: an analysis of frequency and magnitude of change
In this paper, we rigorously analyse how the magnitude and frequency of change may affect the performance of the algorithm (1+1) EAdyn on a set of artificially designed pseudo-Bo...
Philipp Rohlfshagen, Per Kristian Lehre, Xin Yao
GECCO
2009
Springer
132views Optimization» more  GECCO 2009»
15 years 8 months ago
Bringing evolutionary computation to industrial applications with guide
Evolutionary Computation is an exciting research field with the power to assist researchers in the task of solving hard optimization problems (i.e., problems where the exploitabl...
Luís Da Costa, Marc Schoenauer
124
Voted
ISAAC
2009
Springer
140views Algorithms» more  ISAAC 2009»
15 years 8 months ago
Shifting Strategy for Geometric Graphs without Geometry
We give a simple framework which is an alternative to the celebrated and widely used shifting strategy of Hochbaum and Maass [J. ACM, 1985] which has yielded efficient algorithms ...
Imran A. Pirwani
« Prev « First page 2116 / 2390 Last » Next »