Sciweavers

1018 search results - page 109 / 204
» Generative unbinding of names
Sort
View
TEC
2008
118views more  TEC 2008»
13 years 9 months ago
RM-MEDA: A Regularity Model-Based Multiobjective Estimation of Distribution Algorithm
Under mild conditions, it can be induced from the Karush-Kuhn-Tucker condition that the Pareto set, in the decision space, of a continuous multiobjective optimization problem is (m...
Qingfu Zhang, Aimin Zhou, Yaochu Jin
COMBINATORICS
2000
84views more  COMBINATORICS 2000»
13 years 9 months ago
A Note on the Asymptotic Behavior of the Heights in b-Tries for b Large
We study the limiting distribution of the height in a generalized trie in which external nodes are capable to store up to b items (the so called b-tries). We assume that such a tr...
Charles Knessl, Wojciech Szpankowski
DPD
2002
126views more  DPD 2002»
13 years 9 months ago
HiCoMo: High Commit Mobile Transactions
Abstract. We introduce a new mobile transaction model applicable to decisionmaking applications over aggregate data warehoused on mobile hosts. The model allows the aggregate data ...
Minsoo Lee, Abdelsalam Helal
TIT
2008
187views more  TIT 2008»
13 years 8 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer
PVLDB
2010
120views more  PVLDB 2010»
13 years 7 months ago
Sampling the Repairs of Functional Dependency Violations under Hard Constraints
Violations of functional dependencies (FDs) are common in practice, often arising in the context of data integration or Web data extraction. Resolving these violations is known to...
George Beskales, Ihab F. Ilyas, Lukasz Golab