Sciweavers

7924 search results - page 1551 / 1585
» Non-Malleable Functions and Their Applications
Sort
View
CRYPTO
2010
Springer
181views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
Due to its universality oblivious transfer (OT) is a primitive of great importance in secure multi-party computation. OT is impossible to implement from scratch in an unconditional...
Severin Winkler, Jürg Wullschleger
CONEXT
2009
ACM
13 years 8 months ago
Traffic management and resource allocation in small wired/wireless networks
We consider the problem of traffic management in small networks with both wireless and wired devices, connected to the Internet through a single gateway. Examples of such networks...
Christos Gkantsidis, Thomas Karagiannis, Peter B. ...
FAST
2010
13 years 8 months ago
DFS: A File System for Virtualized Flash Storage
This paper presents the design, implementation and evaluation of Direct File System (DFS) for virtualized flash storage. of using traditional layers of abstraction, our layers of ...
William K. Josephson, Lars Ailo Bongo, David Flynn...
GECCO
2008
Springer
155views Optimization» more  GECCO 2008»
13 years 8 months ago
A no-free-lunch framework for coevolution
The No-Free-Lunch theorem is a fundamental result in the field of black-box function optimization. Recent work has shown that coevolution can exhibit free lunches. The question a...
Travis C. Service, Daniel R. Tauritz
GECCO
2008
Springer
117views Optimization» more  GECCO 2008»
13 years 8 months ago
CrossNet: a framework for crossover with network-based chromosomal representations
We propose a new class of crossover operators for genetic algorithms (CrossNet) which use a network-based (or graphbased) chromosomal representation. We designed CrossNet with the...
Forrest Stonedahl, William Rand, Uri Wilensky
« Prev « First page 1551 / 1585 Last » Next »