Sciweavers

905 search results - page 108 / 181
» The Case Against Micropayments
Sort
View
GECCO
2005
Springer
127views Optimization» more  GECCO 2005»
14 years 2 months ago
The enhanced evolutionary tabu search and its application to the quadratic assignment problem
We describe the Enhanced Evolutionary Tabu Search (EE-TS) local search technique. The EE-TS metaheuristic technique combines Reactive Tabu Search with evolutionary computing eleme...
John F. McLoughlin III, Walter Cedeño
ITRUST
2005
Springer
14 years 2 months ago
A Probabilistic Trust Model for Handling Inaccurate Reputation Sources
Abstract. This research aims to develop a model of trust and reputation that will ensure good interactions amongst software agents in large scale open systems in particular. The fo...
Jigar Patel, W. T. Luke Teacy, Nicholas R. Jenning...
NOLISP
2005
Springer
14 years 2 months ago
Weighting Scores to Improve Speaker-Dependent Threshold Estimation in Text-Dependent Speaker Verification
The difficulty of obtaining data from impostors and the scarcity of data are two factors that have a large influence in the estimation of speakerdependent thresholds in text-depend...
Javier R. Saeta, Javier Hernando
OOPSLA
2005
Springer
14 years 2 months ago
PolyD: a flexible dispatching framework
The standard dispatching mechanisms built into programming languages are sometimes inadequate to the needs of the programmer. In the case of Java, the need for more flexibility h...
Antonio Cunei, Jan Vitek
TCC
2005
Springer
139views Cryptology» more  TCC 2005»
14 years 2 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen