Sciweavers

8486 search results - page 1695 / 1698
» Ordered Enumeration Method
Sort
View
IACR
2011
89views more  IACR 2011»
12 years 9 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
AI
2012
Springer
12 years 5 months ago
Plan recognition in exploratory domains
This paper describes a challenging plan recognition problem that arises in environments in which agents engage widely in exploratory behavior, and presents new algorithms for eff...
Ya'akov Gal, Swapna Reddy, Stuart M. Shieber, Ande...
COMGEO
2012
ACM
12 years 5 months ago
Routing multi-class traffic flows in the plane
We study a class of multi-commodity flow problems in geometric domains: For a given planar domain P populated with obstacles (holes) of K ≥ 2 types, compute a set of thick path...
Joondong Kim, Joseph S. B. Mitchell, Valentin Poli...
CORR
2012
Springer
237views Education» more  CORR 2012»
12 years 5 months ago
Novel Component Based Development Model For Sip-Based Mobile Application
Universities and Institutions these days’ deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in ...
Ahmed Barnawi, Abdurrahman H. Al-Talhi, M. Rizwan ...
EC
2012
289views ECommerce» more  EC 2012»
12 years 5 months ago
Multimodal Optimization Using a Bi-Objective Evolutionary Algorithm
In a multimodal optimization task, the main purpose is to find multiple optimal solutions (global and local), so that the user can have a better knowledge about different optima...
Kalyanmoy Deb, Amit Saha
« Prev « First page 1695 / 1698 Last » Next »