Sciweavers

1546 search results - page 231 / 310
» Thoughts on solution concepts
Sort
View
GECCO
2010
Springer
140views Optimization» more  GECCO 2010»
15 years 5 months ago
Investigating the impact of sequential selection in the (1, 4)-CMA-ES on the noiseless BBOB-2010 testbed
This paper investigates the impact of sequential selection, a concept recently introduced for Evolution Strategies (ESs). Sequential selection performs the evaluations of the diļ¬...
Anne Auger, Dimo Brockhoff, Nikolaus Hansen
ATAL
2008
Springer
15 years 5 months ago
Using SOA Provenance to Implement Norm Enforcement in e-Institutions
In the last 10 years several approaches and technologies other than MAS (such as Web services and Grid computing) have emerged, with the support of the industry, providing their o...
Javier Vázquez-Salceda, Sergio Álvar...
124
Voted
BPM
2008
Springer
138views Business» more  BPM 2008»
15 years 5 months ago
Issues in Modeling Process Variants with Provop
For a particular business process, typically, different variants exist. Each of them constitutes an adjustment of a basic process (e.g. a reference process) to specific requirement...
Alena Hallerbach, Thomas Bauer, Manfred Reichert
CCS
2008
ACM
15 years 5 months ago
Provably secure browser-based user-aware mutual authentication over TLS
The standard solution for user authentication on the Web is to establish a TLS-based secure channel in server authenticated mode and run a protocol on top of TLS where the user en...
Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi,...
CCS
2008
ACM
15 years 5 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...