Sciweavers

17789 search results - page 3391 / 3558
» Exceptional Use Cases
Sort
View
134
Voted
CTRSA
2007
Springer
146views Cryptology» more  CTRSA 2007»
15 years 10 months ago
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most s...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
ECTEL
2007
Springer
15 years 10 months ago
The Everlasting Dawn of Educational Brokers - A Search for Key Design Principles
In the last couple of years we have evidenced several initiatives promoting the vision of open educational systems. Educational brokers are supposed to take advantage of this ‘in...
Bernd Simon, Petra Oberhumer, Robert Kristöfl
EDUTAINMENT
2007
Springer
15 years 10 months ago
A Hybrid of Plot-Based and Character-Based Interactive Storytelling
Interactive storytelling in the virtual environment attracts a lot of research interests in recent years. Story plot and character are two most important elements of a story. Based...
Yundong Cai, Chunyan Miao, Ah-Hwee Tan, Zhiqi Shen
GECCO
2007
Springer
183views Optimization» more  GECCO 2007»
15 years 10 months ago
Distribution replacement: how survival of the worst can out perform survival of the fittest
A new family of "Distribution Replacement” operators for use in steady state genetic algorithms is presented. Distribution replacement enforces the members of the populatio...
Howard Tripp, Phil Palmer
GECCO
2007
Springer
138views Optimization» more  GECCO 2007»
15 years 10 months ago
Unwitting distributed genetic programming via asynchronous JavaScript and XML
The success of a genetic programming system in solving a problem is often a function of the available computational resources. For many problems, the larger the population size an...
Jon Klein, Lee Spector
« Prev « First page 3391 / 3558 Last » Next »