Sciweavers

5344 search results - page 962 / 1069
» Privacy-Preserving Set Operations
Sort
View
CPAIOR
2009
Springer
15 years 9 months ago
Modelling Search Strategies in Rules2CP
In this abstract, we present a rule-based modelling language for constraint programming, called Rules2CP [1], and a library PKML for modelling packing problems. Unlike other modell...
François Fages, Julien Martin
116
Voted
DEXA
2009
Springer
127views Database» more  DEXA 2009»
15 years 9 months ago
The Real Performance Drivers behind XML Lock Protocols
Abstract. Fine-grained lock protocols should allow for highly concurrent transaction processing on XML document trees, which is addressed by the taDOM lock protocol family enabling...
Sebastian Bächle, Theo Härder
128
Voted
ESAW
2009
Springer
15 years 9 months ago
Normative Multi-Agent Organizations
Multi-agent systems are viewed as consisting of individual agents whose behaviors are regulated by organization artifacts. This abstract presents a programming language, which is d...
Mehdi Dastani
152
Voted
GECCO
2009
Springer
103views Optimization» more  GECCO 2009»
15 years 9 months ago
Why evolution is not a good paradigm for program induction: a critique of genetic programming
We revisit the roots of Genetic Programming (i.e. Natural Evolution), and conclude that the mechanisms of the process of evolution (i.e. selection, inheritance and variation) are ...
John R. Woodward, Ruibin Bai
GECCO
2009
Springer
111views Optimization» more  GECCO 2009»
15 years 9 months ago
Evolving quorum sensing in digital organisms
For centuries it was thought that bacteria live asocial lives. However, recent discoveries show many species of bacteria communicate in order to perform tasks previously thought t...
Benjamin E. Beckmann, Philip K. McKinley