Sciweavers

14386 search results - page 177 / 2878
» The Chinese Generals Problem
Sort
View
140
Voted
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
15 years 9 months ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie
173
Voted
DBPL
2003
Springer
144views Database» more  DBPL 2003»
15 years 9 months ago
A General Framework for Estimating XML Query Cardinality
Abstract. In the context of XML data management systems, the estimation of query cardinality is becoming more and more important: the information provided by a query result estimat...
Carlo Sartiani
INFOCOM
2002
IEEE
15 years 8 months ago
Application of Network Calculus to General Topologies using Turn-Prohibition
Abstract— Network calculus is known to apply in general only to feedforward routing networks, i.e., networks where routes do not create cycles of interdependent packet flows. In...
David Starobinski, Mark G. Karpovsky, Lev Zakrevsk...
GECCO
2010
Springer
168views Optimization» more  GECCO 2010»
15 years 8 months ago
On the generality of parameter tuning in evolutionary planning
Divide-and-Evolve (DaE) is an original “memeticization” of Evolutionary Computation and Artificial Intelligence Planning. However, like any Evolutionary Algorithm, DaE has se...
Jacques Bibai, Pierre Savéant, Marc Schoena...
136
Voted
CP
2001
Springer
15 years 8 months ago
A General Scheme for Multiple Lower Bound Computation in Constraint Optimization
Abstract. Computing lower bounds to the best-cost extension of a tuple is an ubiquous task in constraint optimization. A particular case of special interest is the computation of l...
Rina Dechter, Kalev Kask, Javier Larrosa