Sciweavers

7924 search results - page 1508 / 1585
» Non-Malleable Functions and Their Applications
Sort
View
ECWEB
2005
Springer
136views ECommerce» more  ECWEB 2005»
14 years 2 months ago
Music Rights Clearance Business Analysis and Delivery
Abstract. Semantic Web Services can be seen as remote Problem Solving Methods offered via the Web through platform and language independent interfaces. They can be seamlessly inte...
Carlos Pedrinaci, Ziv Baida, Hans Akkermans, Amaia...
EMSOFT
2005
Springer
14 years 2 months ago
High-level real-time programming in Java
Real-time systems have reached a level of complexity beyond the scaling capability of the low-level or restricted languages traditionally used for real-time programming. While Met...
David F. Bacon, Perry Cheng, David Grove, Michael ...
EUC
2005
Springer
14 years 2 months ago
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful security applications in ubiquitous computing systems. The ubiquitous computer o...
Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon...
FPL
2005
Springer
122views Hardware» more  FPL 2005»
14 years 2 months ago
FPGA-Aware Garbage Collection in Java
— During codesign of a system, one still runs into the impedance mismatch between the software and hardware worlds. er identifies the different levels of abstraction of hardware...
Philippe Faes, Mark Christiaens, Dries Buytaert, D...
GECCO
2005
Springer
140views Optimization» more  GECCO 2005»
14 years 2 months ago
CGP visits the Santa Fe trail: effects of heuristics on GP
GP uses trees to represent chromosomes. The user defines the representation space by defining the set of functions and terminals to label the nodes in the trees, and GP searches t...
Cezary Z. Janikow, Christopher J. Mann
« Prev « First page 1508 / 1585 Last » Next »