Sciweavers

183 search results - page 18 / 37
» jucs 2008
Sort
View
70
Voted
JUCS
2008
159views more  JUCS 2008»
14 years 10 months ago
Two Step Swarm Intelligence to Solve the Feature Selection Problem
: In this paper we propose a new approach to Swarm Intelligence called Two-Step Swarm Intelligence. The basic idea is to split the heuristic search performed by agents into two sta...
Yudel Gómez, Rafael Bello, Amilkar Puris, M...
JUCS
2008
130views more  JUCS 2008»
14 years 10 months ago
Using PDAs in Meetings: Patterns, Architecture and Components
: This paper addresses the role of Personal Digital Assistants (PDAs) in electronic meetings. Several real-world scenarios of PDA usage in meetings are defined using a pattern lang...
Gustavo Zurita, Pedro Antunes, Nelson Baloian, Lu&...
74
Voted
JUCS
2008
104views more  JUCS 2008»
14 years 10 months ago
Table-form Extraction with Artefact Removal
: In this paper we present a novel methodology to recognize the layout structure of handwritten filled table-forms. Recognition methodology includes locating line intersections, co...
Luiz Antônio Pereira Neves, João Marq...
68
Voted
JUCS
2008
143views more  JUCS 2008»
14 years 10 months ago
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key g...
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow
JUCS
2008
153views more  JUCS 2008»
14 years 10 months ago
Bus Network Optimization with a Time-Dependent Hybrid Algorithm
: This paper describes a new hybrid technique that combines a Greedy Randomized Adaptive Search Procedure (GRASP) and a genetic algorithm with simulation features in order to solve...
Ana C. Olivera, Mariano Frutos, Jessica Andrea Car...