Sciweavers

490 search results - page 61 / 98
» Modeling lobed leaves
Sort
View
ASIACRYPT
2009
Springer
14 years 3 months ago
Cascade Encryption Revisited
Abstract. The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that dou...
Peter Gazi, Ueli M. Maurer
ATAL
2009
Springer
14 years 3 months ago
Effects of resource and remembering on social networks
To better represent human interactions in social networks, the authors take a network-oriented simulation approach to analyze the evolution of acquaintance networks based on local...
Chung-Yuan Huang, Yu-Shiuan Tsai, Chuen-Tsai Sun
JSSPP
2009
Springer
14 years 3 months ago
Decentralized Grid Scheduling with Evolutionary Fuzzy Systems
In this paper, we address the problem of finding workload exchange policies for decentralized Computational Grids using an Evolutionary Fuzzy System. To this end, we establish a n...
Alexander Fölling, Christian Grimme, Joachim ...
EDOC
2008
IEEE
14 years 3 months ago
On Creating Industry-Wide Reference Architectures
Many industries have been developing e-business standards to improve business-to-business interoperability on a mass scale. Most such standards are composed of business data model...
Liming Zhu, Mark Staples, Vladimir Tosic
KBSE
2008
IEEE
14 years 3 months ago
The Consistency of Web Conversations
Abstract—We describe BPELCheck, a tool for statically analyzing interactions of composite web services implemented in BPEL. Our algorithm is compositional, and checks each proces...
Jeffrey Fischer, Rupak Majumdar, Francesco Sorrent...