Sciweavers

1005 search results - page 121 / 201
» Practical Secure Function Evaluation
Sort
View
ACSC
2009
IEEE
14 years 5 months ago
Improving the Transparency of Proxy Injection in Java
Due to their flexibility, proxies have been used for various purposes in standalone and distributed applications. More specifically, object-level proxies support fine grained capa...
Hendrik Gani, Caspar Ryan
CAISE
2006
Springer
14 years 2 months ago
Perspectives about Paradigms in Software Engineering
There is a broad use of the term "paradigm" in Software Engineering. Concepts such as structured paradigm, cascade paradigm or agent-oriented paradigm are very frequent i...
Carlos Cares, Xavier Franch, Enric Mayol
CP
2006
Springer
14 years 2 months ago
Differentiable Invariants
Abstract. Invariants that incrementally maintain the value of expresder assignments to their variables are a natural abstraction to build high-level local search algorithms. But th...
Pascal Van Hentenryck, Laurent Michel
ICANNGA
2007
Springer
134views Algorithms» more  ICANNGA 2007»
14 years 17 hour ago
Optical Design with Epsilon-Dominated Multi-objective Evolutionary Algorithm
Significant improvement over a patented lens design is achieved using multi-objective evolutionary optimization. A comparison of the results obtained from NSGA2 and ε-MOEA is done...
Shaine Joseph, Hyung W. Kang, Uday K. Chakraborty
ICDCS
2002
IEEE
14 years 3 months ago
On the Performance of Group Key Agreement Protocols
Group key agreement is a fundamental building block for secure peer group communication systems. Several group key agreement protocols were proposed in the last decade, all of the...
Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene...