Sciweavers

669 search results - page 68 / 134
» Mastering the Master Theorem
Sort
View
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 7 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
131
Voted
ISN
2000
Springer
151views Communications» more  ISN 2000»
15 years 7 months ago
Agent-Based Management
In logistics of today's economy we have to deal with distributed systems. To support the demanding management task the multi-agent approach offers promising perspectives. For ...
Andreas Kind
128
Voted
CG
2008
Springer
15 years 5 months ago
A Parallel Monte-Carlo Tree Search Algorithm
Monte-Carlo tree search is a powerful paradigm for the game of Go. We present a parallel Master-Slave algorithm for Monte-Carlo tree search. We experimented the algorithm on a netw...
Tristan Cazenave, Nicolas Jouandeau
136
Voted
FECS
2007
138views Education» more  FECS 2007»
15 years 5 months ago
Computing Branches Out: On Revitalizing Computing Education
Computing professionals are employed in so many different ways that it is difficult to even define the common foundation that all of them should master; however, a single degree ...
Ljubomir Perkovic, Amber Settle
IM
2007
15 years 4 months ago
Autonomic Management of Component-Based Embedded Software
Abstract— Software components embedded in ubiquitous systems, especially those using wireless networking, are subject to unpredictable behaviors inherent to using these systems i...
Fabien Romeo, Franck Barbier, Jean-Michel Bruel