Sciweavers

12183 search results - page 51 / 2437
» Computers under Attacks!
Sort
View
IFIPTCS
2010
13 years 7 months ago
Deterministic Computations in Time-Varying Graphs: Broadcasting under Unstructured Mobility
Most highly dynamic infrastructure-less networks have in common that the assumption of connectivity does not necessarily hold at a given instant. Still, communication routes can be...
Arnaud Casteigts, Paola Flocchini, Bernard Mans, N...
ASIACRYPT
2008
Springer
13 years 12 months ago
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
Recently Cash, Kiltz, and Shoup [20] showed a variant of the Cramer-Shoup (CS) public key encryption (PKE) scheme [21] whose chosen-ciphertext (CCA) security relies on the computa...
Goichiro Hanaoka, Kaoru Kurosawa
IJCNN
2006
IEEE
14 years 4 months ago
Computational Neurogenetic Modeling: A Methodology to Study Gene Interactions Underlying Neural Oscillations
—We present new results from Computational Neurogenetic Modeling to aid discoveries of complex gene interactions underlying oscillations in neural systems. Interactions of genes ...
Lubica Benuskova, Simei Gomes Wysoski, Nikola K. K...
GECCO
2003
Springer
105views Optimization» more  GECCO 2003»
14 years 3 months ago
The Underlying Similarity of Diversity Measures Used in Evolutionary Computation
In this paper we compare and analyze the various diversity measures used in the Evolutionary Computation field. While each measure looks quite different from the others in form, we...
Mark Wineberg, Franz Oppacher
ASPDAC
2007
ACM
105views Hardware» more  ASPDAC 2007»
14 years 1 months ago
An Efficient Computation of Statistically Critical Sequential Paths Under Retiming
Abstract-- In this paper we present the Statistical Retimingbased Timing Analysis (SRTA) algorithm. The goal is to compute the timing slack distribution for the nodes in the timing...
Mongkol Ekpanyapong, Xin Zhao, Sung Kyu Lim