Sciweavers

415 search results - page 71 / 83
» A practical generalization of Fourier-based learning
Sort
View
ITICSE
2010
ACM
13 years 11 months ago
JavaSpaces NetBeans: a linda workbench for distributed programming course
In this paper we introduce the JavaSpaces NetBeans IDE (JSN) which integrates the JavaSpaces technology, an implementation of Linda principles in Java, with the NetBeans1 IDE. JSN...
Magdalena Dukielska, Jacek Sroka
COMPSAC
2008
IEEE
13 years 10 months ago
Fabrication of Ontology for Security in Health Care Systems
Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....
J. Indumathi, G. V. Uma
AAAI
2010
13 years 10 months ago
Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions on combinatorially rich structures such as partitions and covers. It is import...
Felix Brandt, Markus Brill, Edith Hemaspaandra, La...
CANDT
2009
13 years 10 months ago
Overhearing the crowd: an empirical examination of conversation reuse in a technical support community
This paper describes a mixed method, empirical analysis of conversation reuse in an online technical support community. I find that the same characteristics that make the conversa...
Derek L. Hansen
GECCO
2008
Springer
115views Optimization» more  GECCO 2008»
13 years 10 months ago
A genetic programming approach to business process mining
The aim of process mining is to identify and extract process patterns from data logs to reconstruct an overall process flowchart. As business processes become more and more comple...
Chris J. Turner, Ashutosh Tiwari, Jörn Mehnen