Sciweavers

61 search results - page 8 / 13
» Choosing Your Beliefs
Sort
View
AAAI
2007
13 years 11 months ago
Adaptive Traitor Tracing with Bayesian Networks
The practical success of broadcast encryption hinges on the ability to (1) revoke the access of compromised keys and (2) determine which keys have been compromised. In this work w...
Philip Zigoris, Hongxia Jin
ISDA
2005
IEEE
14 years 2 months ago
Agent-oriented Design for Network Survivability
Intelligent behavior is the selection of actions based on knowledge. The design of the Fuzzy Adaptive Survivability Tool (FAST) agents and their intelligent behavior is explained....
Mehdi Shajari, Ali A. Ghorbani
MOBIDE
2003
ACM
14 years 2 months ago
XML three-way merge as a reconciliation engine for mobile data
Optimistic replication approaches are often employed on mobile devices, which raises the need for reconciliation of concurrently modified data. We propose that three-way merging ...
Tancred Lindholm
GECCO
2006
Springer
148views Optimization» more  GECCO 2006»
14 years 19 days ago
An effective genetic algorithm for the minimum-label spanning tree problem
Given a connected, undirected graph G with labeled edges, the minimum-label spanning tree problem seeks a spanning tree on G to whose edges are attached the smallest possible numb...
Jeremiah Nummela, Bryant A. Julstrom
FGCS
2010
101views more  FGCS 2010»
13 years 7 months ago
Special section: Switched lightpaths
searchers are now invited to submit abstracts on one or more of the following topics: • Control plane mechanisms, e.g. circuit reservation • Network protocols research, e.g. DC...
P. E. L. Clarke, C. Greenwood, A. C. Davenhall