Sciweavers

1413 search results - page 67 / 283
» A new condensation principle
Sort
View
SPW
1997
Springer
14 years 2 months ago
Protocol Interactions and the Chosen Protocol Attack
There are many cases in the literature in which reuse of the same key material for different functions can open up security holes. In this paper, we discuss such interactions betw...
John Kelsey, Bruce Schneier, David Wagner
GECCO
2006
Springer
159views Optimization» more  GECCO 2006»
14 years 1 months ago
Credit assignment in adaptive evolutionary algorithms
In this paper, a new method for assigning credit to search operators is presented. Starting with the principle of optimizing search bias, search operators are selected based on an...
James M. Whitacre, Q. Tuan Pham, Ruhul A. Sarker
AIPS
2007
14 years 13 days ago
Structural Patterns of Tractable Sequentially-Optimal Planning
We study the complexity of sequentially-optimal classical planning, and discover new problem classes for whose such optimization is tractable. The results are based on exploiting ...
Michael Katz, Carmel Domshlak
TNC
2004
146views Education» more  TNC 2004»
13 years 11 months ago
Connective Middleware for Voice and Integrated Communications
To engage Internet2 users in an exploration of peer-to-peer, real-time communications, these users require connectivity. Superior networking connectivity alone is not sufficient. ...
Ben Teitelbaum
JVCA
2010
105views more  JVCA 2010»
13 years 8 months ago
Conditional stochastic simulation for character animation
In a context of interactive applications, adapting motion capture data to new situations or producing variants of them are known as non trivial tasks. We propose an original metho...
N. Courty, Anne Cuzol