Sciweavers

493 search results - page 73 / 99
» types 1998
Sort
View
PPSN
1998
Springer
15 years 6 months ago
Multi-parent Recombination in Genetic Algorithms with Search Space Boundary Extension by Mirroring
In previous work, we have investigated real coded genetic algorithms with several types of multi-parent recombination operators and found evidence that multi-parent recombination w...
Shigeyoshi Tsutsui
PPSN
1998
Springer
15 years 6 months ago
Modeling Building-Block Interdependency
The Building-Block Hypothesis appeals to the notion of problem decomposition and the assembly of solutions from sub-solutions. Accordingly, there have been many varieties of GA tes...
Richard A. Watson, Gregory Hornby, Jordan B. Polla...
VLDB
1998
ACM
111views Database» more  VLDB 1998»
15 years 6 months ago
Filtering with Approximate Predicates
Approximate predicates can be used to reduce the number of comparisons made by expensive, complex predicates. For example, to check if a point is within a region (expensive predic...
Narayanan Shivakumar, Hector Garcia-Molina, Chandr...
97
Voted
DAC
1998
ACM
15 years 5 months ago
Efficient Boolean Division and Substitution
Boolean division, and hence Boolean substitution, produces better result than algebraic division and substitution. However, due to the lack of an efficient Boolean division algorit...
Shih-Chieh Chang, David Ihsin Cheng
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
15 years 5 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong