Sciweavers

4335 search results - page 19 / 867
» Privatizing Constraint Optimization
Sort
View
ATAL
2005
Springer
14 years 1 months ago
The value of privacy: optimal strategies for privacy minded agents
Agents often want to protect private information, while at the same acting upon the information. These two desires are in conflict, and this conflict can be modeled in strategic...
Sieuwert van Otterloo
SEDE
2007
13 years 9 months ago
A software tool for optimal class-hierarchy design based on the use-relationship among functions and variables
We present a software tool for creating an optimal classhierarchy from the use-relationship among data-items and functions based on the method in Kundu and Gwee [3]. The tool dete...
Nigel Gwee, Sukhamay Kundu
AMC
2006
107views more  AMC 2006»
13 years 7 months ago
Linear bilevel programming with upper level constraints depending on the lower level solution
Focus in the paper is on the definition of linear bilevel programming problems, the existence of optimal solutions and necessary as well as sufficient optimality conditions. In th...
Ayalew Getachew Mersha, Stephan Dempe
PODC
2009
ACM
14 years 8 months ago
Simple and efficient asynchronous byzantine agreement with optimal resilience
Consider a completely asynchronous network consisting of n parties where every two parties are connected by a private channel. An adversary At with unbounded computing power activ...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
ISCA
2005
IEEE
90views Hardware» more  ISCA 2005»
14 years 1 months ago
Optimizing Replication, Communication, and Capacity Allocation in CMPs
Chip multiprocessors (CMPs) substantially increase capacity pressure on the on-chip memory hierarchy while requiring fast access. Neither private nor shared caches can provide bot...
Zeshan Chishti, Michael D. Powell, T. N. Vijaykuma...