Sciweavers

811 search results - page 48 / 163
» When Novelty Is Not Enough
Sort
View
HCI
2011
13 years 5 days ago
Proposal of BCM Evaluation Method Based on Disaster Scenario Simulation
Almost 20% of big earthquakes in the world occur in Japan. It becomes impossible for private companies and governments to carry out their business if they suffer from severe damage...
Ryuhei Kaneko, Yoshio Nakatani
ICSE
2012
IEEE-ACM
11 years 11 months ago
WitchDoctor: IDE support for real-time auto-completion of refactorings
—Integrated Development Environments (IDEs) have come to perform a wide variety of tasks on behalf of the programmer, refactoring being a classic example. These operations have u...
Stephen R. Foster, William G. Griswold, Sorin Lern...
ICSE
2012
IEEE-ACM
11 years 11 months ago
Engineering and verifying requirements for programmable self-assembling nanomachines
—We propose an extension of van Lamsweerde’s goal-oriented requirements engineering to the domain of programmable DNA nanotechnology. This is a domain in which individual devic...
Robyn R. Lutz, Jack H. Lutz, James I. Lathrop, Tit...
GECCO
2009
Springer
199views Optimization» more  GECCO 2009»
14 years 1 months ago
Using behavioral exploration objectives to solve deceptive problems in neuro-evolution
Encouraging exploration, typically by preserving the diversity within the population, is one of the most common method to improve the behavior of evolutionary algorithms with dece...
Jean-Baptiste Mouret, Stéphane Doncieux
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
14 years 1 days ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro