Sciweavers

886 search results - page 105 / 178
» Generalized Bezout Identity
Sort
View
CIKM
2007
Springer
14 years 3 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
CPAIOR
2007
Springer
14 years 3 months ago
A Column Generation Based Destructive Lower Bound for Resource Constrained Project Scheduling Problems
In this paper we present a destructive lower bound for a number of resource constrained project scheduling (RCPS) problems, which is based on column generation. We first look at t...
J. M. van den Akker, Guido Diepen, J. A. Hoogeveen
CSCLP
2007
Springer
14 years 3 months ago
Quasi-Linear-Time Algorithms by Generalisation of Union-Find in CHR
Abstract. The union-find algorithm can be seen as solving simple equations between variables or constants. With a few lines of code change, we generalise its implementation in CHR...
Thom W. Frühwirth
ESAS
2007
Springer
14 years 3 months ago
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems
RFID-tags can be seen as a new generation of bar codes with added functionality. They are becoming very popular tools for identification of products in various applications such a...
Neil Bird, Claudine Conrado, Jorge Guajardo, Stefa...
GECCO
2007
Springer
178views Optimization» more  GECCO 2007»
14 years 3 months ago
Nonlinear dynamics modelling for controller evolution
The problem of how to acquire a model of a physical robot, which is fit for evolution of controllers that can subsequently be used to control that robot, is considered in the con...
Julian Togelius, Renzo De Nardi, Hugo Gravato Marq...