Sciweavers

576 search results - page 81 / 116
» Matching methodology to problem domain
Sort
View
CCS
2010
ACM
13 years 8 months ago
A new framework for efficient password-based authenticated key exchange
Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on a cryptographically strong session key. The...
Adam Groce, Jonathan Katz
TOG
2008
145views more  TOG 2008»
13 years 8 months ago
Feedback control of cumuliform cloud formation based on computational fluid dynamics
Clouds play an important role for creating realistic images of outdoor scenes. In order to generate realistic clouds, many methods have been developed for modeling and animating c...
Yoshinori Dobashi, Katsutoshi Kusumoto, Tomoyuki N...
CDC
2010
IEEE
105views Control Systems» more  CDC 2010»
13 years 3 months ago
Universal scheduling for networks with arbitrary traffic, channels, and mobility
We extend stochastic network optimization theory to treat networks with arbitrary sample paths for arrivals, channels, and mobility. The network can experience unexpected link or n...
Michael J. Neely
SIGMOD
2008
ACM
113views Database» more  SIGMOD 2008»
13 years 8 months ago
Supporting OLAP operations over imperfectly integrated taxonomies
OLAP is an important tool in decision support. With the help of domain knowledge, such as hierarchies of attribute values, OLAP helps the user observe the effects of various decis...
Yan Qi 0002, K. Selçuk Candan, Jun'ichi Tat...
GECCO
2007
Springer
235views Optimization» more  GECCO 2007»
14 years 2 months ago
Expensive optimization, uncertain environment: an EA-based solution
Real life optimization problems often require finding optimal solution to complex high dimensional, multimodal problems involving computationally very expensive fitness function e...
Maumita Bhattacharya