Sciweavers

5255 search results - page 958 / 1051
» Formal Methods for Privacy
Sort
View
ACMDIS
2010
ACM
13 years 10 months ago
Investigating the relationship between imagery and rationale in design
Artifacts can be used to inspire, guide, and create new designs. As approaches to design can range from focusing on inspiration to formalized reasoning, we seek to create and stud...
Shahtab Wahid, Stacy M. Branham, D. Scott McCricka...
ISLPED
2010
ACM
158views Hardware» more  ISLPED 2010»
13 years 10 months ago
Temperature- and energy-constrained scheduling in multitasking systems: a model checking approach
The ongoing scaling of semiconductor technology is causing severe increase of on-chip power density and temperature in microprocessors. This has raised urgent requirement for both...
Weixun Wang, Xiaoke Qin, Prabhat Mishra
CEC
2010
IEEE
13 years 10 months ago
Towards probabilistic memetic algorithm: An initial study on capacitated arc routing problem
— Capacitated arc routing problem (CARP) has attracted much attention due to its generality to many real world problems. Memetic algorithm (MA), among other metaheuristic search ...
Liang Feng, Yew-Soon Ong, Quang Huy Nguyen 0001, A...
ATAL
2010
Springer
13 years 10 months ago
Verifying agents with memory is harder than it seemed
ATL+ is a variant of alternating-time temporal logic that does not have the expressive power of full ATL , but still allows for expressing some natural properties of agents. It ha...
Nils Bulling, Wojciech Jamroga
RECSYS
2010
ACM
13 years 10 months ago
Interactive recommendations in social endorsement networks
An increasing number of social networking platforms are giving users the option to endorse entities that they find appealing, such as videos, photos, or even other users. We defin...
Theodoros Lappas, Dimitrios Gunopulos