Sciweavers

9210 search results - page 1609 / 1842
» Analyzing Real-Time Systems
Sort
View
IJNSEC
2007
143views more  IJNSEC 2007»
13 years 10 months ago
Distributed Cryptographic Computing on Grid
Distributed cryptographic computing system plays an important role in cryptographic research since cryptographic computing is extremely computation sensitive. There are many resea...
Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin
IJNSEC
2007
142views more  IJNSEC 2007»
13 years 10 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
ANOR
2005
128views more  ANOR 2005»
13 years 10 months ago
Expectation-Stock Dynamics in Multi-Agent Fisheries
In this paper we consider a game-theoretic dynamic model describing the exploitation of a renewable resource. Our model is based on a Cournot oligopoly game where n profit-maximizi...
Gian Italo Bischi, Michael Kopel, Ferenc Szidarovs...
APIN
2005
92views more  APIN 2005»
13 years 10 months ago
A Hybrid Neural-Genetic Algorithm for the Frequency Assignment Problem in Satellite Communications
A hybrid Neural-Genetic algorithm (NG) is presented for the frequency assignment problem in satellite communications (FAPSC). The goal of this problem is minimizing the cochannel i...
Sancho Salcedo-Sanz, Carlos Bousoño-Calz&oa...
INTERNET
2007
103views more  INTERNET 2007»
13 years 10 months ago
Publish-Subscribe Information Delivery with Substring Predicates
The content-based publish/subscribe (pub/sub)paradigm for system design is becoming increasingly popular, offering unique benefits for a large number of data-intensive applicatio...
Ioannis Aekaterinidis, Peter Triantafillou
« Prev « First page 1609 / 1842 Last » Next »