Sciweavers

727 search results - page 116 / 146
» ads 2004
Sort
View
PPSN
2004
Springer
14 years 1 months ago
SPEA2+: Improving the Performance of the Strength Pareto Evolutionary Algorithm 2
Multi-objective optimization methods are essential to resolve real-world problems as most involve several types of objects. Several multi-objective genetic algorithms have been pro...
Mifa Kim, Tomoyuki Hiroyasu, Mitsunori Miki, Shiny...
RT
2004
Springer
14 years 1 months ago
Rendering Procedural Terrain by Geometry Image Warping
We describe an approach for rendering large terrains in real-time. A digital elevation map defines the rough shape of the terrain. During rendering, procedural geometric and text...
Carsten Dachsbacher, Marc Stamminger
SACRYPT
2004
Springer
125views Cryptology» more  SACRYPT 2004»
14 years 1 months ago
Password Based Key Exchange with Mutual Authentication
A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Li...
Shaoquan Jiang, Guang Gong
UPP
2004
Springer
14 years 29 days ago
Grassroots Approach to Self-management in Large-Scale Distributed Systems
Abstract. Traditionally, autonomic computing is envisioned as replacing the human factor in the deployment, administration and maintenance of computer systems that are ever more co...
Özalp Babaoglu, Márk Jelasity, Alberto...
ACSAC
2004
IEEE
13 years 11 months ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson