Sciweavers

542 search results - page 44 / 109
» A Novel Information Transmission Problem and Its Optimal Sol...
Sort
View
IACR
2011
73views more  IACR 2011»
12 years 9 months ago
Secure Authentication from a Weak Key, Without Leaking Information
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
Niek J. Bouman, Serge Fehr
GECCO
2007
Springer
185views Optimization» more  GECCO 2007»
14 years 4 months ago
An informed convergence accelerator for evolutionary multiobjective optimiser
A novel optimisation accelerator deploying neural network predictions and objective space direct manipulation strategies is presented. The concept of directing the search through ...
Salem F. Adra, Ian Griffin, Peter J. Fleming
PPSN
1998
Springer
14 years 2 months ago
A Spatial Predator-Prey Approach to Multi-objective Optimization: A Preliminary Study
This paper presents a novel evolutionary approach of approximating the shape of the Pareto-optimal set of multi-objective optimization problems. The evolutionary algorithm (EA) use...
Marco Laumanns, Günter Rudolph, Hans-Paul Sch...
MONET
2008
85views more  MONET 2008»
13 years 10 months ago
Population Adaptation for Genetic Algorithm-based Cognitive Radios
Genetic algorithms are best suited for optimization problems involving large search spaces. The problem space encountered when optimizing the transmission parameters of an agile or...
Timothy R. Newman, Rakesh Rajbanshi, Alexander M. ...
GLOBECOM
2008
IEEE
14 years 4 months ago
Optimal Location Updates in Mobile Ad Hoc Networks: A Separable Cost Case
Abstract—We consider the location service in a mobile adhoc network (MANET), where each node needs to maintain its location information in the network by (i) frequently updating ...
Zhenzhen Ye, Alhussein A. Abouzeid