Sciweavers

4702 search results - page 14 / 941
» How to Copyright a Function
Sort
View
PKC
1999
Springer
102views Cryptology» more  PKC 1999»
14 years 3 months ago
How to Enhance the Security of Public-Key Encryption at Minimum Cost
This paper presents a simple and efficient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure...
Eiichiro Fujisaki, Tatsuaki Okamoto
GECCO
2006
Springer
134views Optimization» more  GECCO 2006»
14 years 2 months ago
PSO and multi-funnel landscapes: how cooperation might limit exploration
Particle Swarm Optimization (PSO) is a population-based optimization method in which search points employ a cooperative strategy to move toward one another. In this paper we show ...
Andrew M. Sutton, Darrell Whitley, Monte Lunacek, ...
FPCA
1995
14 years 2 months ago
How Much Non-Strictness do Lenient Programs Require?
Lenient languages, such as Id90, have been touted as among the best functional languages for massively parallel machines AHN88]. Lenient evaluation combines non-strict semantics w...
Klaus E. Schauser, Seth Copen Goldstein
EH
2004
IEEE
106views Hardware» more  EH 2004»
14 years 2 months ago
How to Evolve the Head-Tail Pattern from Reaction-Diffusion Systems
The possible application of evolving artificial embryos to build functional machinery is a promising area of research. Unfortunately, there are still many fundamental problems to ...
Felix Streichert, Christian Spieth, Holger Ulmer, ...
ICAD
2004
14 years 8 days ago
How to Tackle Auditory Interface Aesthetics: Discussion and Case Study
This paper discusses the importance of auditory interface aesthetics and presents an empirical investigation of sound aesthetics in context. The theoretical discussion examines th...
Grégory Leplâtre, Iain McGregor