Sciweavers

5344 search results - page 77 / 1069
» Privacy-Preserving Set Operations
Sort
View
APCSAC
2004
IEEE
14 years 1 months ago
Validating Word-Oriented Processors for Bit and Multi-word Operations
We examine secure computing paradigms to identify any new architectural challenges for future general-purpose processors. Some essential security functions can be provided by diffe...
Ruby B. Lee, Xiao Yang, Zhijie Shi
JANCL
2007
74views more  JANCL 2007»
13 years 10 months ago
Operations on proofs and labels
Logic of proofs LP introduced by S. Artemov in 1995 describes properties of proof predicate “t is a proof of F” in the propositional language extended by atoms of the form [[t...
Tatiana Yavorskaya, Natalia Rubtsova
CEC
2005
IEEE
14 years 3 months ago
Constraint quadratic approximation operator for treating equality constraints with genetic algorithms
Abstract- This paper presents a new operator for genetic algorithms that enhances their convergence in the case of nonlinear problems with nonlinear equality constraints. The propo...
Elizabeth F. Wanner, Frederico G. Guimarães...
GECCO
2009
Springer
126views Optimization» more  GECCO 2009»
14 years 2 months ago
Improving NSGA-II with an adaptive mutation operator
The performance of a Multiobjective Evolutionary Algorithm (MOEA) is crucially dependent on the parameter setting of the operators. The most desired control of such parameters pre...
Arthur Gonçalves Carvalho, Aluizio F. R. Ar...
ECAI
2000
Springer
14 years 2 months ago
Incorporation of Temporal Logic Control into Plan Operators
Domain-specific control information is often essential in solving difficult planning problems efficiently. Temporal logics are a declarative and expressive representation for su...
Jussi Rintanen