Sciweavers

98 search results - page 14 / 20
» Consistently Incorporating Changes to Evolve Transition-base...
Sort
View
ACSAC
2003
IEEE
14 years 20 days ago
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs
In this paper, we present a new approach for safe execution of untrusted programs by isolating their effects from the rest of the system. Isolation is achieved by intercepting fi...
Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
GECCO
2008
Springer
144views Optimization» more  GECCO 2008»
13 years 8 months ago
Multiobjective robustness for portfolio optimization in volatile environments
Multiobjective methods are ideal for evolving a set of portfolio optimisation solutions that span a range from highreturn/high-risk to low-return/low-risk, and an investor can cho...
Ghada Hassan, Christopher D. Clack
JMLR
2002
78views more  JMLR 2002»
13 years 7 months ago
Shallow Parsing using Specialized HMMs
We present a unified technique to solve different shallow parsing tasks as a tagging problem using a Hidden Markov Model-based approach (HMM). This technique consists of the incor...
Antonio Molina, Ferran Pla
PVLDB
2010
114views more  PVLDB 2010»
13 years 5 months ago
Peer coordination through distributed triggers
This is a demonstration of data coordination in a peer data management system through the employment of distributed triggers. The latter express in a declarative manner individual...
Verena Kantere, Maher Manoubi, Iluju Kiringa, Timo...
ECAI
2004
Springer
14 years 22 days ago
A Backtracking Strategy for Order-Independent Incremental Learning
Agents that exist in an environment that changes over time, and are able to take into account the temporal nature of experience, are commonly called incremental learners. It is wid...
Nicola Di Mauro, Floriana Esposito, Stefano Ferill...