Sciweavers

1151 search results - page 183 / 231
» Optimization of coded GMSK systems
Sort
View
122
Voted
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
15 years 7 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
120
Voted
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
15 years 6 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...
135
Voted
ENTCS
2006
101views more  ENTCS 2006»
15 years 2 months ago
Mumbo: A Rule-Based Implementation of a Run-time Program Generation Language
We describe our efforts to use rule-based programming to produce a model of Jumbo, a run-time program generation (RTPG) system for Java. Jumbo incorporates RTPG following the simp...
Baris Aktemur, Samuel N. Kamin
135
Voted
ISCA
2008
IEEE
136views Hardware» more  ISCA 2008»
15 years 2 months ago
The Design and Performance of a Bare PC Web Server
There is an increasing need for new Web server architectures that are application-centric, simple, small, and pervasive in nature. In this paper, we present a novel architecture f...
Long He, Ramesh K. Karne, Alexander L. Wijesinha
106
Voted
SWARM
2008
SPRINGER
15 years 2 months ago
Massively multi-robot simulation in stage
Abstract Stage is a C++ software library that simulates multiple mobile robots. Stage version 2, as the simulation backend for the Player/Stage system, may be the most commonly use...
Richard Vaughan