Sciweavers

669 search results - page 16 / 134
» Mastering the Master Theorem
Sort
View
94
Voted
GECCO
2007
Springer
136views Optimization» more  GECCO 2007»
15 years 9 months ago
Automatic heuristic generation with genetic programming: evolving a jack-of-all-trades or a master of one
Edmund K. Burke, Matthew R. Hyde, Graham Kendall, ...
104
Voted
CHES
2005
Springer
87views Cryptology» more  CHES 2005»
15 years 9 months ago
Templates as Master Keys
We introduce two new attacks: the single-bit template attack and the template-enhanced DPA attack. The single-bit template attack can be used very effectively to classify even sin...
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Ka...
106
Voted
DBISP2P
2005
Springer
79views Database» more  DBISP2P 2005»
15 years 9 months ago
A Gradient Topology for Master-Slave Replication in Peer-to-Peer Environments
Open peer-to-peer architectures offer many possibilities for replicating database content, but designers have to deal with problems such as peer churn rates and inherent uncertain...
Jan Sacha, Jim Dowling