Sciweavers

2086 search results - page 248 / 418
» Mathematical Theory Exploration
Sort
View
102
Voted
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
15 years 7 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
125
Voted
ATAL
2007
Springer
15 years 7 months ago
Modeling plan coordination in multiagent decision processes
In multiagent planning, it is often convenient to view a problem as two subproblems: agent local planning and coordination. Thus, we can classify agent activities into two categor...
Ping Xuan
SUTC
2010
IEEE
15 years 7 months ago
A Log-Ratio Information Measure for Stochastic Sensor Management
—In distributed sensor networks, computational and energy resources are in general limited. Therefore, an intelligent selection of sensors for measurements is of great importance...
Daniel Lyons, Benjamin Noack, Uwe D. Hanebeck
140
Voted
GECCO
2007
Springer
189views Optimization» more  GECCO 2007»
15 years 7 months ago
A genetic algorithm with exon shuffling crossover for hard bin packing problems
A novel evolutionary approach for the bin packing problem (BPP) is presented. A simple steady-state genetic algorithm is developed that produces results comparable to other approa...
Philipp Rohlfshagen, John A. Bullinaria
121
Voted
FOAL
2009
ACM
15 years 7 months ago
Graph-based specification and simulation of featherweight Java with around advice
In this paper we specify an operational run-time semantics of Assignment Featherweight Java -- a minimal subset of Java with assignments -- with around advice, using graph transfo...
Tom Staijen, Arend Rensink