Sciweavers

1596 search results - page 172 / 320
» Human-Guided Simple Search
Sort
View
110
Voted
ICPP
2007
IEEE
15 years 11 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao
128
Voted
ESORICS
2007
Springer
15 years 10 months ago
Encryption Techniques for Secure Database Outsourcing
Abstract. While the idea of database outsourcing is becoming increasingly popular, the associated security risks still prevent many potential users from deploying it. In particular...
Sergei Evdokimov, Oliver Günther
ESWS
2007
Springer
15 years 10 months ago
Scalable Web Service Composition with Partial Matches
We investigate scalable algorithms for automated composition (WSC) of Semantic Web Services. Our notion of WSC is very general: the composition semantics includes background knowl...
Adina Sirbu, Jörg Hoffmann
130
Voted
GECCO
2007
Springer
164views Optimization» more  GECCO 2007»
15 years 10 months ago
A study of mutational robustness as the product of evolutionary computation
This paper investigates the ability of a tournament selection based genetic algorithm to find mutationally robust solutions to a simple combinatorial optimization problem. Two di...
Justin Schonfeld
114
Voted
GECCO
2007
Springer
175views Optimization» more  GECCO 2007»
15 years 10 months ago
On the constructiveness of context-aware crossover
Crossover in Genetic Programming is mostly a destructive operator, generally producing children worse than the parents and occasionally producing those who are better. A recently ...
Hammad Majeed, Conor Ryan