Sciweavers

5580 search results - page 956 / 1116
» Randomized priority algorithms
Sort
View
ILP
2007
Springer
15 years 8 months ago
Applying Inductive Logic Programming to Process Mining
The management of business processes has recently received a lot of attention. One of the most interesting problems is the description of a process model in a language that allows ...
Evelina Lamma, Paola Mello, Fabrizio Riguzzi, Serg...
IPSN
2007
Springer
15 years 8 months ago
A group tour guide system with RFIDs and wireless sensor networks
This paper proposes a new application framework for group tour guiding services based on RFIDs and wireless sensor network. We consider a sensing field mixed with multiple indepe...
Po-Yu Chen, Wen Tseun Chen, Cheng Han Wu, Yu-Chee ...
ISSAC
2007
Springer
132views Mathematics» more  ISSAC 2007»
15 years 8 months ago
Adaptive loops with kaapi on multicore and grid: applications in symmetric cryptography
The parallelization of two applications in symmetric cryptography is considered: block ciphering and a new method based on random sampling for the selection of basic substitution ...
Vincent Danjean, Roland Gillard, Serge Guelton, Je...
LCPC
2007
Springer
15 years 8 months ago
A Novel Asynchronous Software Cache Implementation for the Cell-BE Processor
This paper describes the implementation of a runtime library for asynchronous communication in the Cell BE processor. The runtime library implementation provides with several servi...
Jairo Balart, Marc González, Xavier Martore...
94
Voted
MFCS
2007
Springer
15 years 8 months ago
Evolvability
A framework for analyzing the computational capabilities and the limitations of the evolutionary process of random change guided by selection was recently introduced by Valiant [V...
Leslie G. Valiant