Sciweavers

872 search results - page 134 / 175
» An Access Control Language for a General Provenance Model
Sort
View
ATAL
2009
Springer
13 years 11 months ago
Effective bidding and deal identification for negotiations in highly nonlinear scenarios
Most real-world negotiation scenarios involve multiple, interdependent issues. These scenarios are specially challenging because the agents' utility functions are nonlinear, ...
Ivan Marsá-Maestre, Miguel A. López-...
ECAL
1995
Springer
13 years 11 months ago
Contemporary Evolution Strategies
After an outline of the history of evolutionary algorithms, a new ( ) variant of the evolution strategies is introduced formally. Though not comprising all degrees of freedom, it i...
Hans-Paul Schwefel, Günter Rudolph
PLDI
2009
ACM
14 years 8 days ago
Flow-sensitive semantics for dynamic information flow policies
Dynamic information flow policies, such as declassification, are essential for practically useful information flow control systems. However, most systems proposed to date that ...
Niklas Broberg, David Sands
ECOOP
1993
Springer
13 years 11 months ago
Nested Mixin-Methods in Agora
: Mixin-based inheritance is an inheritance technique that has been shown to subsume a variety of different inheritance mechanisms. It is based directly upon an incremental modific...
Patrick Steyaert, Wim Codenie, Theo D'Hondt, Koen ...
AVI
2008
13 years 10 months ago
End-user visualizations
Computer visualization has advanced dramatically over the last few years, partially driven by the exploding video game market. 3D hardware acceleration has reached the point where...
Alexander Repenning, Andri Ioannidou