Sciweavers

2738 search results - page 27 / 548
» The Frobenius Problem and Its Generalizations
Sort
View
ICFP
2009
ACM
14 years 8 months ago
A theory of typed coercions and its applications
A number of important program rewriting scenarios can be recast as type-directed coercion insertion. These range from more theoretical applications such as coercive subtyping and ...
Nikhil Swamy, Michael W. Hicks, Gavin M. Bierman
IDTRUST
2009
ACM
14 years 2 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
INFOCOM
2007
IEEE
14 years 1 months ago
Navigation in Distance Vector Spaces and Its Use for Node Avoidance Routing
—Traditional network routing uses the single (shortest) path paradigm. This paradigm exposes sessions to various attacks along this path, such as eavesdropping, DoS attacks etc. ...
Haim Zlatokrilov, Hanoch Levy
GECCO
2007
Springer
147views Optimization» more  GECCO 2007»
14 years 1 months ago
Exact analysis of the sampling distribution for the canonical particle swarm optimiser and its convergence during stagnation
Several theoretical analyses of the dynamics of particle swarms have been offered in the literature over the last decade. Virtually all rely on substantial simplifications, incl...
Riccardo Poli, David S. Broomhead
GECCO
2007
Springer
155views Optimization» more  GECCO 2007»
14 years 1 months ago
Observing the swarm behaviour during its evolutionary design
Evolutionary Algorithms (EAs) can be used for designing Particle Swarm Optimization (PSO) algorithms that work, in some cases, considerably better than the human-designed ones. By...
Laura Diosan, Mihai Oltean