Sciweavers

12697 search results - page 2335 / 2540
» Call for Papers
Sort
View
ESOP
2005
Springer
14 years 4 months ago
Asserting Bytecode Safety
Abstract. We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and ...
Martin Wildmoser, Tobias Nipkow
FSE
2005
Springer
153views Cryptology» more  FSE 2005»
14 years 4 months ago
F-FCSR: Design of a New Class of Stream Ciphers
In this paper we present a new class of stream ciphers based on a very simple mechanism. The heart of our method is a Feedback with Carry Shift Registers (FCSR) automaton. This au...
François Arnault, Thierry P. Berger
GECCO
2005
Springer
154views Optimization» more  GECCO 2005»
14 years 4 months ago
Combining competent crossover and mutation operators: a probabilistic model building approach
This paper presents an approach to combine competent crossover and mutation operators via probabilistic model building. Both operators are based on the probabilistic model buildin...
Cláudio F. Lima, Kumara Sastry, David E. Go...
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
14 years 4 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
GI
2005
Springer
14 years 4 months ago
Analysis and Design Techniques for Service-Oriented Development and Integration
: Service-Oriented Architectures (SOAs) have been established as an IT strategy to support the on demand goal of business agility. Web services standards and their implementations ...
Olaf Zimmermann, Niklas Schlimm, Günter Walle...
« Prev « First page 2335 / 2540 Last » Next »