نتایج جستجو برای: search protocols
تعداد نتایج: 391475 فیلتر نتایج به سال:
Recently, a new search strategy called configuration checking (CC) was proposed, for handling the cycling problem of local search. The CC strategy was used to improve the EWLS algorithm, a state-of-the-art local search for Minimum Vertex Cover (MVC). In this paper, we use this strategy to develop a local search algorithm for SAT called CWcc and a local search algorithm for weighted MAX-2-SAT ca...
there are many approaches for solving variety combinatorial optimization problems (np-compelete) that devided to exact solutions and approximate solutions. exact methods can only be used for very small size instances due to their expontional search space. for real-world problems, we have to employ approximate methods such as evolutionary algorithms (eas) that find a near-optimal solution in a r...
In order for mobile agents to achieve their goals they must possess information about the location of objects in their environment. Given that mobile agents are often intended to cope with highly dynamic situations, it is clear that some mechanism should be employed to make sure this information is correct. This paper investigates the difficulties in providing location database support for mobi...
Peer-to-Peer (P2P) file sharing is the hottest, fastest growing application on the Internet. When designing Gnutella-like applications, the most important consideration is the scalability problem. Recently, different search protocols have been proposed to remedy the problems in Gnutella’s flooding. However, congestion due to large query loads from users and peer heterogeneity definitely impact ...
JXTA is a set of platform-independent, open source peer-to-peer protocols that has become popular for building services and applications based on peer-to-peer overlays. Existing work towards evaluating one of JXTA‘s core protocols,the JXTA search algorithm, has mainly focused on testbed-based experiments. Although such evaluation configurations offer accurate results based on real deployments, ...
implant surgery in mandibular anterior region may turn from an easy minor surgery into a complicated one for the surgeon, due to inadequate knowledge of the anatomy of the surgical area and/or ignorance toward the required surgical protocol. hence, the purpose of this article is to present an overview on the: (a) incidence of massive bleeding and its consequences after implant placement in mand...
This paper presents history-dependent scheduling, a new technique for reducing the search space in the verification of cryptographic protocols. This technique allows the detection of some “non-minimal” interleavings during a depth-first search, and was implemented in TRUST, our cryptographic protocol verifier. We give some experimental results showing that our method can greatly increase the ef...
Security protocol verification has been the area where the bulk of the research in cryptographic protocols has taken place and a number of successful supporting tools have been developed. However, not much research has been done in the area of applying formal methods to the design of cryptographic protocols in the first place, despite wide recognition that the design of cryptographic protocols ...
as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید