Sciweavers

4498 search results - page 24 / 900
» How to Invent Functions
Sort
View
EVOW
2009
Springer
13 years 5 months ago
Conquering the Needle-in-a-Haystack: How Correlated Input Variables Beneficially Alter the Fitness Landscape for Neural Networks
Abstract. Evolutionary algorithms such as genetic programming and grammatical evolution have been used for simultaneously optimizing network architecture, variable selection, and w...
Stephen D. Turner, Marylyn D. Ritchie, William S. ...
HICSS
2009
IEEE
77views Biometrics» more  HICSS 2009»
14 years 2 months ago
Users of Open Source Software - How Do They Get Help?
A study was conducted across multiple open source software online technical help communities. This paper presents the types of discussions that occur, the types of questions asked...
Vandana Singh, Michael B. Twidale, David M. Nichol...
EUROCRYPT
2001
Springer
14 years 2 days ago
How to Convert the Flavor of a Quantum Bit Commitment
In this paper we show how to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealin...
Claude Crépeau, Frédéric L&ea...
ARC
2007
Springer
119views Hardware» more  ARC 2007»
14 years 1 months ago
Authentication of FPGA Bitstreams: Why and How
Abstract. Encryption of volatile FPGA bitstreams provides confidentiality to the design but does not ensure its authenticity. This paper motivates the need for adding authenticati...
Saar Drimer
CRYPTO
2007
Springer
93views Cryptology» more  CRYPTO 2007»
13 years 11 months ago
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
Danny Harnik, Yuval Ishai, Eyal Kushilevitz