Sciweavers

1746 search results - page 299 / 350
» A linear implementation of PACMAN
Sort
View
IOR
2008
113views more  IOR 2008»
13 years 8 months ago
Finding Supply Function Equilibria with Asymmetric Firms
Abstract Firms compete in supply functions when they offer a schedule of prices and quantities into a market; for example, this occurs in many wholesale electricity markets. We stu...
Edward J. Anderson, Xinmin Hu
ICSOC
2010
Springer
13 years 8 months ago
Adaptive Management of Composite Services under Percentile-Based Service Level Agreements
We present a brokering service for the adaptive management of composite services. The goal of this broker is to dynamically adapt at runtime the composite service configuration, ...
Valeria Cardellini, Emiliano Casalicchio, Vincenzo...
JPDC
2010
137views more  JPDC 2010»
13 years 8 months ago
Parallel exact inference on the Cell Broadband Engine processor
—We present the design and implementation of a parallel exact inference algorithm on the Cell Broadband Engine (Cell BE). Exact inference is a key problem in exploring probabilis...
Yinglong Xia, Viktor K. Prasanna
PAMI
2010
276views more  PAMI 2010»
13 years 8 months ago
Local-Learning-Based Feature Selection for High-Dimensional Data Analysis
—This paper considers feature selection for data classification in the presence of a huge number of irrelevant features. We propose a new feature selection algorithm that addres...
Yijun Sun, Sinisa Todorovic, Steve Goodison
SEKE
2010
Springer
13 years 8 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li