Sciweavers

2703 search results - page 220 / 541
» Working Class Hero
Sort
View
FSE
2006
Springer
104views Cryptology» more  FSE 2006»
15 years 8 months ago
Chosen-Ciphertext Attacks Against MOSQUITO
Self-Synchronizing Stream Ciphers (SSSC) are a particular class of symmetric encryption algorithms, such that the resynchronization is automatic, in case of error during the transm...
Antoine Joux, Frédéric Muller
FSTTCS
2006
Springer
15 years 8 months ago
Approximation Algorithms for 2-Stage Stochastic Optimization Problems
Abstract. Stochastic optimization is a leading approach to model optimization problems in which there is uncertainty in the input data, whether from measurement noise or an inabili...
Chaitanya Swamy, David B. Shmoys
GECCO
2006
Springer
156views Optimization» more  GECCO 2006»
15 years 8 months ago
Improving GP classifier generalization using a cluster separation metric
Genetic Programming offers freedom in the definition of the cost function that is unparalleled among supervised learning algorithms. However, this freedom goes largely unexploited...
Ashley George, Malcolm I. Heywood
ATAL
2003
Springer
15 years 8 months ago
An exploration of bugs and debugging in multi-agent systems
Debugging multi-agent systems, which are concurrent, distributed, and consist of complex components, is difficult, yet crucial. In earlier work we have proposed mechanisms whereby...
David Poutakidis, Lin Padgham, Michael Winikoff
ECOOP
2000
Springer
15 years 8 months ago
Load-Time Structural Reflection in Java
The standard reflection API of Java provides the ability to introspect a program but not to alter program behavior. This paper presents an extension to the reflection API for addr...
Shigeru Chiba