Sciweavers

5451 search results - page 1048 / 1091
» Typed Operational Semantics
Sort
View
CPAIOR
2007
Springer
14 years 2 months ago
Cost-Bounded Binary Decision Diagrams for 0-1 Programming
Abstract. In recent work binary decision diagrams (BDDs) were introduced as a technique for postoptimality analysis for integer programming. In this paper we show that much smaller...
Tarik Hadzic, John N. Hooker
ECAL
2007
Springer
14 years 2 months ago
Multi-level Selection in the Emergence of Language Systematicity
Language can be viewed as a complex adaptive system which is continuously shaped and reshaped by the actions of its users as they try to solve communicative problems. To maintain c...
Luc Steels, Remi van Trijp, Pieter Wellens
FC
2007
Springer
158views Cryptology» more  FC 2007»
14 years 2 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
14 years 2 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
SSD
2007
Springer
171views Database» more  SSD 2007»
14 years 2 months ago
Transformation of Continuous Aggregation Join Queries over Data Streams
We address continuously processing an aggregation join query over data streams. Queries of this type involve both join and aggregation operations, with windows specified on join ...
Tri Minh Tran, Byung Suk Lee
« Prev « First page 1048 / 1091 Last » Next »