Sciweavers

861 search results - page 97 / 173
» Predicting Attack-prone Components
Sort
View
AE
2005
Springer
14 years 4 months ago
Incorporating Knowledge of Secondary Structures in a L-System-Based Encoding for Protein Folding
An encoding scheme for protein folding on lattice models, inspired by parametric L-systems, was proposed. The encoding incorporates problem domain knowledge in the form of predesig...
Gabriela Ochoa, Gabi Escuela, Natalio Krasnogor
FSE
2005
Springer
122views Cryptology» more  FSE 2005»
14 years 4 months ago
Analysis of the Bit-Search Generator and Sequence Compression Techniques
Abstract. Algebraic attacks on stream ciphers apply (at least theoretically) to all LFSR-based stream ciphers that are clocked in a simple and/or easily predictable way. One intere...
Aline Gouget, Hervé Sibert, Côme Berb...
NIME
2004
Springer
162views Music» more  NIME 2004»
14 years 4 months ago
The Architecture of Auracle: a Real-Time, Distributed, Collaborative Instrument
Auracle is a “group instrument,” controlled by the voice, for real-time, interactive, distributed music making over the Internet. It is implemented in the JavaTM programming l...
Chandrasekhar Ramakrishnan, Jason Freeman, Kristja...
PARA
2004
Springer
14 years 4 months ago
Performance Oriented Development and Tuning of GRID Applications
GRID Application development is a hard task. Good applications should correctly use large distributed systems, whose infrastructure heavily affects the application performance. In ...
Emilio Mancini, Massimiliano Rak, Roberto Torella,...
DOCENG
2003
ACM
14 years 3 months ago
Two diet plans for fat PDF
As Adobe's Portable Document Format has exploded in popularity so too has the number PDF generators, and predictably the quality of generated PDF varies considerably. This pa...
Thomas A. Phelps, Robert Wilensky