Sciweavers

657 search results - page 16 / 132
» A Version Numbering Scheme with a Useful Lexicographical Ord...
Sort
View
COCOON
2005
Springer
14 years 28 days ago
Quartet-Based Phylogeny Reconstruction from Gene Orders
Abstract. Phylogenetic reconstruction from gene-rearrangement data is attracting increasing attention from biologists and computer scientists. Methods used in reconstruction includ...
Tao Liu, Jijun Tang, Bernard M. E. Moret
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
14 years 1 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase
INFOCOM
2007
IEEE
14 years 1 months ago
A Suite of Schemes for User-Level Network Diagnosis without Infrastructure
—It is highly desirable and important for end users, with no special privileges, identify and pinpoint faults inside the network that degrade the performance of their application...
Yao Zhao, Yan Chen
IJNSEC
2006
84views more  IJNSEC 2006»
13 years 7 months ago
Security on Generalized Feistel Scheme with SP Round Function
This paper studies the security against differential/linear cryptanalysis and the pseudorandomness for a class of generalized Feistel scheme with SP round function called GFSP. We ...
Wenling Wu, Wentao Zhang, Dongdai Lin
EVOW
2010
Springer
13 years 10 months ago
On the Benefit of Sub-optimality within the Divide-and-Evolve Scheme
Divide-and-Evolve (DaE) is an original "memeticization" of Evolutionary Computation and Artificial Intelligence Planning. DaE optimizes either the number of actions, or t...
Jacques Bibai, Pierre Savéant, Marc Schoena...