Sciweavers

1141 search results - page 177 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
15 years 10 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani
EEE
2005
IEEE
15 years 10 months ago
Predicting the Survival or Failure of Click-and-Mortar Corporations
With the boom in e-business, several corporations have emerged in the late nineties that have primarily conducted their business through the Internet and the Web. They have come t...
Indranil Bose, Raktim Pal
ITICSE
2005
ACM
15 years 9 months ago
Implications of perspective in teaching objects first and object design
There are an increasing number of books published on the important topics of “object-oriented programming” and “object-oriented design” for use in education. However, obje...
Henrik Bærbak Christensen
DSOM
2005
Springer
15 years 9 months ago
Control Considerations for Scalable Event Processing
The growth in the scale of systems and networks has created many challenges for their management, especially for event processing. Our premise is that scaling event processing requ...
Wei Xu, Joseph L. Hellerstein, Bill Kramer, David ...
GECCO
2010
Springer
197views Optimization» more  GECCO 2010»
15 years 9 months ago
Adaptive strategy selection in differential evolution
Differential evolution (DE) is a simple yet powerful evolutionary algorithm for global numerical optimization. Different strategies have been proposed for the offspring generation...
Wenyin Gong, Álvaro Fialho, Zhihua Cai