Sciweavers

1272 search results - page 107 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
GECCO
2000
Springer
138views Optimization» more  GECCO 2000»
15 years 7 months ago
Domain Knowledge and Representation in Genetic Algorithms for Real World Scheduling Problems
This paper discusses the issues that arise in the design and implementation of an industrialstrength evolutionary-based system for the optimization of the monthly work schedules f...
Ioannis T. Christou, Armand Zakarian
CCGRID
2010
IEEE
15 years 5 months ago
A Map-Reduce System with an Alternate API for Multi-core Environments
Map-reduce framework has received a significant attention and is being used for programming both large-scale clusters and multi-core systems. While the high productivity aspect of ...
Wei Jiang, Vignesh T. Ravi, Gagan Agrawal
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
14 years 4 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert
EUROCRYPT
1995
Springer
15 years 7 months ago
Verifiable Signature Sharing
Abstract. We introduce Verifiable Signature Sharing (VCS), a cryptographic primitive for protecting digital signatures. VCS enables the holder of a digitally signed document, who m...
Matthew K. Franklin, Michael K. Reiter
ICWS
2010
IEEE
15 years 2 months ago
Semantic Annotations for WS-Policy
WS-Policy is a standard to express requirements and capabilities in Web service systems. Policies are based on domain-specific assertions. In this paper we present a lightweight ap...
Sebastian Speiser