Sciweavers

5962 search results - page 962 / 1193
» Working with Patterns and Code
Sort
View
EUROPKI
2004
Springer
15 years 9 months ago
Flexible and Scalable Public Key Security for SSH
Abstract. A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. How...
Yasir Ali, Sean W. Smith
GECCO
2004
Springer
114views Optimization» more  GECCO 2004»
15 years 9 months ago
Evolutionary Drug Scheduling Model for Cancer Chemotherapy
This paper presents a modified optimal control model of drug scheduling in cancer chemotherapy and a new adaptive elitist-population based genetic algorithm (AEGA) to solve it. Wo...
Yong Liang, Kwong-Sak Leung, Tony Shu Kam Mok
GECCO
2004
Springer
15 years 9 months ago
Selection-Insertion Schemes in Genetic Algorithms for the Flexible Ligand Docking Problem
Abstract. In this work we have implemented and analyzed the performance of a new real coded steady-state genetic algorithm (SSGA) for the flexible ligand-receptor docking problem....
Camila S. de Magalhães, Helio J. C. Barbosa...
GI
2004
Springer
15 years 9 months ago
Reliability study of an embedded operating system for industrial applications
: Critical industrial applications or fault tolerant applications need for operating systems (OS) which guarantee a correct and safe behaviour despite the appearance of errors. In ...
Juan Pardo, José Carlos Campelo, Juan Jos&e...
SPIN
2004
Springer
15 years 9 months ago
Translation from Adapted UML to Promela for CORBA-Based Applications
Nowadays, many distributed applications take advantage of the transparent distributed object systems provided by CORBA middlewares. While greatly reduce the design and coding effo...
Jessica Chen, Hanmei Cui