Sciweavers

4335 search results - page 128 / 867
» Privatizing Constraint Optimization
Sort
View
TCOM
2008
81views more  TCOM 2008»
15 years 2 months ago
On optimal computation of MPLS label binding for multipoint-to-point connections
Most network operators have considered reducing Label Switched Routers (LSR) label spaces (i.e. the number of labels that can be used) as a means of simplifying management of under...
Fernando Solano, Ramón Fabregat, José...
GECCO
2003
Springer
160views Optimization» more  GECCO 2003»
15 years 7 months ago
Hybridization of Estimation of Distribution Algorithms with a Repair Method for Solving Constraint Satisfaction Problems
Estimation of Distribution Algorithms (EDAs) are new promising methods in the field of genetic and evolutionary algorithms. In the case of conventional Genetic and Evolutionary Al...
Hisashi Handa
116
Voted
ACL
2006
15 years 4 months ago
Constraint-Based Sentence Compression: An Integer Programming Approach
The ability to compress sentences while preserving their grammaticality and most of their meaning has recently received much attention. Our work views sentence compression as an o...
James Clarke, Mirella Lapata
117
Voted
ICASSP
2011
IEEE
14 years 6 months ago
Worst-case based robust adaptive beamforming for general-rank signal models using positive semi-definite covariance constraint
In this paper, we develop a new approach to the robust beamforming for general-rank signal models. Our method is based on the worst-case performance optimization using a semi-de n...
Haihua Chen, Alex B. Gershman
111
Voted
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
15 years 8 months ago
Round-Optimal Secure Two-Party Computation
Abstract. We consider the central cryptographic task of secure twoparty computation, where two parties wish to compute some function of their private inputs (each receiving possibl...
Jonathan Katz, Rafail Ostrovsky