Sciweavers

4544 search results - page 855 / 909
» Reinforcement Learning with Time
Sort
View
FUN
2010
Springer
230views Algorithms» more  FUN 2010»
14 years 1 months ago
Scheduling with Bully Selfish Jobs
In job scheduling with precedence constraints, i j means that job j cannot start being processed before job i is completed. In this paper we consider selfish bully jobs who do no...
Tami Tamir
ACMSE
2008
ACM
13 years 12 months ago
Optimization of the multiple retailer supply chain management problem
With stock surpluses and shortages representing one of the greatest elements of risk to wholesalers, a solution to the multiretailer supply chain management problem would result i...
Caio Soares, Gerry V. Dozier, Emmett Lodree, Jared...
CCS
2008
ACM
13 years 12 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
MMM
2010
Springer
141views Multimedia» more  MMM 2010»
13 years 12 months ago
Slow Intelligence Systems
: Networks and distributed computing systems are becoming increasingly important and at the same time, more and more critical to the world of Information Technology. This rash spre...
Shi-Kuo Chang
ESWS
2008
Springer
13 years 11 months ago
OntoGame: Weaving the Semantic Web by Online Games
Most of the challenges faced when building the Semantic Web require a substantial amount of human labor and intelligence. Despite significant advancement in ontology learning and h...
Katharina Siorpaes, Martin Hepp