Sciweavers

91 search results - page 15 / 19
» Why an informatics degree
Sort
View
GECCO
2008
Springer
148views Optimization» more  GECCO 2008»
13 years 8 months ago
Using quotient graphs to model neutrality in evolutionary search
We introduce quotient graphs for modeling neutrality in evolutionary search. We demonstrate that for a variety of evolutionary computing problems, search can be characterized by g...
Dominic Wilson, Devinder Kaur
KAIS
2006
77views more  KAIS 2006»
13 years 7 months ago
Finding centric local outliers in categorical/numerical spaces
Outlier detection techniques are widely used in many applications such as credit card fraud detection, monitoring criminal activities in electronic commerce, etc. These application...
Jeffrey Xu Yu, Weining Qian, Hongjun Lu, Aoying Zh...
ICONFERENCE
2011
13 years 2 months ago
Lifting the veil: the expression of values in online communities
Wikipedia’s stated mission is to provide a free encyclopedia that people all over the world can use and contribute to. However, while Wikipedia is successful at providing access...
Jonathan T. Morgan, Robert M. Mason, Karine Nahon
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
AAIM
2007
Springer
97views Algorithms» more  AAIM 2007»
13 years 11 months ago
Efficiency of Data Distribution in BitTorrent-Like Systems
BitTorrent (BT) in practice is a very efficient method to share data over a network of clients. In this paper we extend the recent work of Arthur and Panigrahy [1] on modelling the...
Ho-Leung Chan, Tak Wah Lam, Prudence W. H. Wong