Sciweavers

5580 search results - page 956 / 1116
» Randomized priority algorithms
Sort
View
ILP
2007
Springer
14 years 3 months ago
Applying Inductive Logic Programming to Process Mining
The management of business processes has recently received a lot of attention. One of the most interesting problems is the description of a process model in a language that allows ...
Evelina Lamma, Paola Mello, Fabrizio Riguzzi, Serg...
IPSN
2007
Springer
14 years 3 months ago
A group tour guide system with RFIDs and wireless sensor networks
This paper proposes a new application framework for group tour guiding services based on RFIDs and wireless sensor network. We consider a sensing field mixed with multiple indepe...
Po-Yu Chen, Wen Tseun Chen, Cheng Han Wu, Yu-Chee ...
ISSAC
2007
Springer
132views Mathematics» more  ISSAC 2007»
14 years 3 months ago
Adaptive loops with kaapi on multicore and grid: applications in symmetric cryptography
The parallelization of two applications in symmetric cryptography is considered: block ciphering and a new method based on random sampling for the selection of basic substitution ...
Vincent Danjean, Roland Gillard, Serge Guelton, Je...
LCPC
2007
Springer
14 years 3 months ago
A Novel Asynchronous Software Cache Implementation for the Cell-BE Processor
This paper describes the implementation of a runtime library for asynchronous communication in the Cell BE processor. The runtime library implementation provides with several servi...
Jairo Balart, Marc González, Xavier Martore...
MFCS
2007
Springer
14 years 3 months ago
Evolvability
A framework for analyzing the computational capabilities and the limitations of the evolutionary process of random change guided by selection was recently introduced by Valiant [V...
Leslie G. Valiant