Sciweavers

264 search results - page 20 / 53
» ma 2010
Sort
View
IJNSEC
2010
91views more  IJNSEC 2010»
13 years 4 months ago
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing
The three-party password-based key exchange protocols using Weil pairing proposed by Wen is vulnerable to impersonation attack. By introducing hard artificial intelligence problem...
Yong Zeng, Jianfeng Ma, Sang-Jae Moon
CORR
2010
Springer
64views Education» more  CORR 2010»
13 years 7 months ago
Opinion fluctuations and disagreement in social networks
ic copy available at: http://ssrn.com/abstract=1682187 Massachusetts Institute of Technology Department of Economics Working Paper Series Opinion Fluctuations and Disagreement in S...
Daron Acemoglu, Giacomo Como, Fabio Fagnani, Asuma...
IPL
2010
109views more  IPL 2010»
13 years 4 months ago
A new parameter for a broadcast algorithm with locally bounded Byzantine faults
This paper deals with broadcasting in a network with t-locally bounded Byzantine faults. One of the simplest broadcasting algorithms under Byzantine failures is referred to as a c...
Akira Ichimura, Maiko Shigeno
ICDIM
2010
IEEE
13 years 7 months ago
Risk management in dynamic role based access control systems
We present a risk management framework which allows to reason about and manage risk for role based access control systems. The framework expresses essential characteristics of risk...
Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski
GECCO
2010
Springer
172views Optimization» more  GECCO 2010»
14 years 2 months ago
Biogeography-based optimization with blended migration for constrained optimization problems
Biogeography-based optimization (BBO) is a new evolutionary algorithm based on the science of biogeography. We propose two extensions to BBO. First, we propose blended migration. ...
Haiping Ma, Dan Simon