Sciweavers

1096 search results - page 141 / 220
» Using Prior Knowledge: Problems and Solutions
Sort
View
127
Voted
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
15 years 9 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
144
Voted
EDBT
2009
ACM
106views Database» more  EDBT 2009»
15 years 7 months ago
AlphaSum: size-constrained table summarization using value lattices
Consider a scientist who wants to explore multiple data sets to select the relevant ones for further analysis. Since the visualization real estate may put a stringent constraint o...
K. Selçuk Candan, Huiping Cao, Yan Qi 0002,...
136
Voted
ICDCSW
2006
IEEE
15 years 9 months ago
Multi-radio channel allocation in competitive wireless networks
Channel allocation has been extensively studied in the framework of cellular networks, but the emergence of new system concepts, such as cognitive radio systems, bring this topic ...
Márk Félegyházi, Mario Cagalj...
GECCO
2008
Springer
155views Optimization» more  GECCO 2008»
15 years 4 months ago
Experiments with indexed FOR-loops in genetic programming
We investigated how indexed FOR-loops, such as the ones found in procedural programming languages, can be implemented in genetic programming. We use them to train programs that le...
Gayan Wijesinghe, Victor Ciesielski
CORR
2008
Springer
121views Education» more  CORR 2008»
15 years 3 months ago
On the Application of Hierarchical Coevolutionary Genetic Algorithms: Recombination and Evaluation Partners
This paper examines the use of a hierarchical coevolutionary genetic algorithm under different partnering strategies. Cascading clusters of sub-populations are built from the bott...
Uwe Aickelin, Larry Bull