Sciweavers

949 search results - page 70 / 190
» ISAC - Instance-Specific Algorithm Configuration
Sort
View
CISSE
2008
Springer
13 years 10 months ago
Anonymity Leakage Reduction in Network Latency
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity ...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome
COORDINATION
2008
Springer
13 years 10 months ago
Session Types for Orchestration Charts
We present a novel approach for the sound orchestration of services. It is based on Orcharts and Typecharts: a service orchestration language and an associated behavioural typing l...
Alessandro Fantechi, Elie Najm
ADMI
2010
Springer
13 years 9 months ago
Clustering in a Multi-Agent Data Mining Environment
A Multi-Agent based approach to clustering using a generic Multi-Agent Data Mining (MADM) framework is described. The process use a collection of agents, running several different ...
Santhana Chaimontree, Katie Atkinson, Frans Coenen
AAAI
2004
13 years 9 months ago
A Correspondence Metric for Imitation
Abstract-- Learning by imitation and learning from demonstration have received considerable attention in robotics. However, very little research has been in the direction of provid...
R. Amit, Maja J. Mataric
TSE
2008
111views more  TSE 2008»
13 years 8 months ago
Effective Software Merging in the Presence of Object-Oriented Refactorings
Current text based Software Configuration Management (SCM) systems have trouble with refactorings. Refactorings result in global changes which lead to merge conflicts. A refactorin...
Danny Dig, Kashif Manzoor, Ralph E. Johnson, Tien ...