Sciweavers

117 search results - page 9 / 24
» A Comparison of Cryptography Courses
Sort
View
EVOW
2004
Springer
14 years 24 days ago
A Comparison of Adaptive Operator Scheduling Methods on the Traveling Salesman Problem
Abstract. The implementation of an evolutionary algorithm necessarily involves the selection of an appropriate set of genetic operators. For many real-world problem domains, an inc...
Wouter Boomsma
ANOR
2008
76views more  ANOR 2008»
13 years 7 months ago
Performance comparison of several priority schemes with priority jumps
In this paper, we consider several discrete-time priority queues with priority jumps. In a priority scheduling scheme with priority jumps, real-time and non-real-time packets arri...
Tom Maertens, Joris Walraevens, Herwig Bruneel
PKC
2007
Springer
124views Cryptology» more  PKC 2007»
14 years 1 months ago
Practical and Secure Solutions for Integer Comparison
Abstract. Yao’s classical millionaires’ problem is about securely determining whether x > y, given two input values x, y, which are held as private inputs by two parties, re...
Juan A. Garay, Berry Schoenmakers, José Vil...
CHES
2004
Springer
148views Cryptology» more  CHES 2004»
14 years 24 days ago
Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
We present an implementation of elliptic curves and of hyperelliptic curves of genus 2 and 3 over prime fields. To achieve a fair comparison between the different types of groups,...
Roberto Maria Avanzi
ICALT
2003
IEEE
14 years 21 days ago
Visualization of the Learning Process Using Concept Mapping
Visualization of the learning processes is a powerful way to help students to understand their curricula and the structure behind them. CME2 is a prototype software of this favour...
Jussi A. Nuutinen, Erkki Sutinen