Sciweavers

5114 search results - page 873 / 1023
» Complex networks
Sort
View
ESORICS
2007
Springer
14 years 3 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
EUROPAR
2007
Springer
14 years 3 months ago
Esodyp+: Prefetching in the Jackal Software DSM
Abstract. Prefetching transfers a data item in advance from its storage location to its usage location so that communication is hidden and does not delay computation. We present a ...
Michael Klemm, Jean Christophe Beyler, Ronny T. La...
GECCO
2007
Springer
177views Optimization» more  GECCO 2007»
14 years 3 months ago
Evolving virtual creatures revisited
Thirteen years have passed since Karl Sims published his work on evolving virtual creatures. Since then, several novel approaches to neural network evolution and genetic algorithm...
Peter Krcah
HPCC
2007
Springer
14 years 3 months ago
Performance Prediction Based Resource Selection in Grid Environments
Deploying Grid technologies by distributing an application over several machines has been widely used for scientific simulations, which have large requirements for computational r...
Peggy Lindner, Edgar Gabriel, Michael M. Resch
HUC
2007
Springer
14 years 3 months ago
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation
This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy. It distinguishes between three approaches feasible...
Sarah Spiekermann