Sciweavers

811 search results - page 94 / 163
» When Novelty Is Not Enough
Sort
View
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
14 years 14 days ago
On the Higher Order Nonlinearities of Algebraic Immune Functions
Abstract. One of the most basic requirements concerning Boolean functions used in cryptosystems is that they must have high algebraic degrees. This simple criterion is not always w...
Claude Carlet
EUROPAR
2006
Springer
14 years 13 days ago
A Practical Single-Register Wait-Free Mutual Exclusion Algorithm on Asynchronous Networks
This paper is motivated by a need of practical asynchronous network systems, i.e., a wait-free distributed mutual exclusion algorithm (WDME). The WDME algorithm is very appealing w...
Hyungsoo Jung, Heon Young Yeom
GECCO
2006
Springer
147views Optimization» more  GECCO 2006»
14 years 13 days ago
Deceptiveness and neutrality the ND family of fitness landscapes
When a considerable number of mutations have no effects on fitness values, the fitness landscape is said neutral. In order to study the interplay between neutrality, which exists ...
William Beaudoin, Sébastien Vérel, P...
ASWEC
2001
IEEE
14 years 13 days ago
Applying Static Analysis to Large-Scale, Multi-Threaded Java Programs
Static analysis is a tremendous help when trying to find faults in complex software. Writing multi-threaded programs is difficult, because the thread scheduling increases the prog...
Cyrille Artho, Armin Biere
FODO
1998
Springer
214views Algorithms» more  FODO 1998»
14 years 11 days ago
Querying Composite Objects in Semistructured Data
In this paper, we propose an entity-based style of queries for semistructured data. First, we partition a semistructured data into subgraphs corresponding to real-world entities, ...
Keishi Tajima