Sciweavers

2214 search results - page 314 / 443
» Initial Design of the
Sort
View
EGC
2005
Springer
14 years 2 months ago
XDTM: The XML Data Type and Mapping for Specifying Datasets
We are concerned with the following problem: How do we allow a community of users to access and process diverse data stored in many different formats? Standard data formats and da...
Luc Moreau, Yong Zhao, Ian T. Foster, Jens-S. V&ou...
EUC
2005
Springer
14 years 2 months ago
HMRP: Hierarchy-Based Multipath Routing Protocol for Wireless Sensor Networks
Wireless sensor networks comprise of small nodes with sensing, computation and wireless communication capabilities. The energy efficiency is a substantial key design issues in suc...
Ying-Hong Wang, Hung-Jen Mao, Chih-Hsiao Tsai, Chi...
EUROCRYPT
2005
Springer
14 years 2 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu
GECCO
2005
Springer
142views Optimization» more  GECCO 2005»
14 years 2 months ago
Toward evolved flight
We present the first hardware-in-the-loop evolutionary optimization on an ornithopter. Our experiments demonstrate the feasibility of evolving flight through genetic algorithms an...
Rusty Hunt, Gregory Hornby, Jason D. Lohn
IPTPS
2005
Springer
14 years 2 months ago
A First Look at Peer-to-Peer Worms: Threats and Defenses
Abstract— Peer-to-peer (P2P) worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentially more effective strat...
Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole ...