Sciweavers

14386 search results - page 2754 / 2878
» The Chinese Generals Problem
Sort
View
CSFW
2010
IEEE
13 years 11 months ago
A Framework for the Sound Specification of Cryptographic Tasks
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via the "trusted-party paradigm," where the protocol execution is compar...
Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
EDBT
2010
ACM
164views Database» more  EDBT 2010»
13 years 11 months ago
Techniques for efficiently querying scientific workflow provenance graphs
A key advantage of scientific workflow systems over traditional scripting approaches is their ability to automatically record data and process dependencies introduced during workf...
Manish Kumar Anand, Shawn Bowers, Bertram Ludä...
GECCO
2010
Springer
206views Optimization» more  GECCO 2010»
13 years 11 months ago
Development of efficient particle swarm optimizers by using concepts from evolutionary algorithms
Particle swarm optimization (PSO) has been in practice for more than 10 years now and has gained wide popularity in various optimization tasks. In the context to single objective ...
Kalyanmoy Deb, Nikhil Padhye
CHI
2010
ACM
13 years 11 months ago
Characteristics of pressure-based input for mobile devices
We conducted a series of user studies to understand and clarify the fundamental characteristics of pressure in user interfaces for mobile devices. We seek to provide insight to cl...
Craig Stewart, Michael Rohs, Sven G. Kratz, Georg ...
ACSD
2009
IEEE
106views Hardware» more  ACSD 2009»
13 years 10 months ago
Specification Enforcing Refinement for Convertibility Verification
Protocol conversion deals with the automatic synthesis of an additional component, often referred to as an adaptor or a converter, to bridge mismatches between interacting compone...
Partha S. Roop, Alain Girault, Roopak Sinha, Grego...
« Prev « First page 2754 / 2878 Last » Next »