Sciweavers

169 search results - page 30 / 34
» Experimental Quantum Cryptography
Sort
View
EUROGP
2010
Springer
160views Optimization» more  EUROGP 2010»
14 years 11 days ago
Fine-Grained Timing Using Genetic Programming
In previous work, we have demonstrated that it is possible to use Genetic Programming to minimise the resource consumption of software, such as its power consumption or execution t...
David Robert White, Juan E. Tapiador, Julio C&eacu...
IJCAI
2003
13 years 10 months ago
ODISET: On-line Distributed Session Tracing using Agents
When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
Salvador Mandujano, Arturo Galván
SIGCSE
2008
ACM
365views Education» more  SIGCSE 2008»
13 years 9 months ago
Computer science olympiad: exploring computer science through competition
Generating interest in specialized areas of Computer Science (CS) is one of the goals of the department of Computer and Information Science at Spelman College as with most departm...
Iretta B. C. Kearse, Charles Hardnett
TPDS
2008
133views more  TPDS 2008»
13 years 9 months ago
Mutual Anonymity for Mobile P2P Systems
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communication and resource sharing patterns in unfixed network infrastructures. As priv...
Jinsong Han, Yunhao Liu
TIFS
2010
82views more  TIFS 2010»
13 years 7 months ago
Lossless data embedding in electronic inks
—This paper presents a novel lossless data embedding algorithm for electronic inks. The proposed algorithm first computes the analytical ink-curve for each stroke as a set of sm...
Hong Cao, Alex C. Kot