Browsing School of Computer Science and Informatics by Title
Now showing items 2418-2437 of 2979
-
SCADA security in the light of Cyber-Warfare
(Article) -
Scalable reduction of large datasets to interesting subsets
(Article)With a huge amount of RDF data available on the web, the ability to find and access relevant information is crucial. Traditional approaches to storing, querying, and reasoning fall short when faced with web-scale data. We ... -
A scalable test suite for dynamic multiobjective optimization
(Article)Dynamic multiobjective optimization (DMO) has gained increasing attention in recent years. Test problems are of great importance in order to facilitate the development of advanced algorithms that can handle dynamic ... -
Scalarizing functions in decomposition-based multiobjective evolutionary algorithms
(Article)Decomposition-based multiobjective evolutionary algorithms have received increasing research interests due to their high performance for solving multiobjective optimization problems. However, scalarizing functions, which ... -
Scale Factor Inheritance Mechanism in Distributed Differential Evolution
(Article)This article proposes a distributed differential evolution which employs a novel self-adaptive scheme, namely scale factor inheritance. In the proposed algorithm, the population is distributed over several sub-populations ... -
Scale factor local search in differential evolution
(Article)This paper proposes the scale factor local search differential evolution (SFLSDE). The SFLSDE is a differential evolution (DE) based memetic algorithm which employs, within a self-adaptive scheme, two local search algorithms. ... -
Schaum's outline of UML
(Book) -
SciMAT: A New Science Mapping Analysis Software Tool
(Article)This article presents a new open-source software tool, SciMAT, which performs science mapping analysis within a longitudinal framework. It provides different modules that help the analyst to carry out all the steps of the ... -
Secure Communication Architecture for Dynamic Energy Management in Smart Grid
(Article)Smart grid takes advantage of communication technologies for efficient energy management and utilization. It entails sacrifice from consumers in terms of reducing load during peak hours by using a dynamic energy pricing ... -
Secure Communication Architecture for Dynamic Energy Management in Smart Grid
(Article)Smart grid takes advantage of communication technologies for efficient energy management and utilization. It entails sacrifice from consumers in terms of reducing load during peak hours by using a dynamic energy pricing ... -
A secure data outsourcing scheme based on Asmuth – Bloom secret sharing
(Article)Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide ... -
A Secure Online Key Establishment Scheme for Mobile Heterogeneous Sensor Networks
(Article)Advancement in wireless sensor network (WSN) technology makes it more attractive technology to be adopted in real world applications including home and industrial automation and e-health or infrastructure monitoring. ... -
Secure routing protocol base.
(Article) -
Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer
(Article)Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses Oblivious Transfer and provides security in the semi-honest model. The other scheme uses Committed Oblivious ...