Sciweavers

44 search results - page 8 / 9
» Collaborative agent-based learning with limited data exchang...
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 1 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
WWW
2008
ACM
14 years 8 months ago
First workshop on targeting and ranking for online advertising
Online advertising is a rapidly growing, multi-billion dollar industry. It has become a significant element of the Web browsing experience. Ad platforms used for ad selection use ...
Ewa Dominowska, Vanja Josifovski
CI
2002
92views more  CI 2002»
13 years 7 months ago
Model Selection in an Information Economy: Choosing What to Learn
As online markets for the exchange of goods and services become more common, the study of markets composed at least in part of autonomous agents has taken on increasing importance...
Christopher H. Brooks, Robert S. Gazzale, Rajarshi...
IJPP
2011
115views more  IJPP 2011»
12 years 11 months ago
Milepost GCC: Machine Learning Enabled Self-tuning Compiler
Tuning compiler optimizations for rapidly evolving hardware makes porting and extending an optimizing compiler for each new platform extremely challenging. Iterative optimization i...
Grigori Fursin, Yuriy Kashnikov, Abdul Wahid Memon...
ICETE
2004
101views Business» more  ICETE 2004»
13 years 9 months ago
Protecting Legacy Applications from Unicode
: While XML-based Web Service architectures are successfully turning the Web into an infrastructure for cooperating applications, not all problems with respect to interoperability ...
Erik Wilde