Sciweavers

131 search results - page 22 / 27
» Revocation Systems with Very Small Private Keys
Sort
View
ENTCS
2006
123views more  ENTCS 2006»
13 years 7 months ago
Wrapping of Web Sources with restricted Query Interfaces by Query Tunneling
Information sources in the World Wide Web usually offer two different schemes to their users, an Interface Schema which the user can query and a Result Schema which the user can b...
Thomas Kabisch, Mattis Neiling
ANSS
2005
IEEE
14 years 1 months ago
Performance Preserving Network Downscaling
The Internet is a large, complex, heterogeneous system operating at very high speeds and consisting of a large number of users. Researchers use a suite of tools and techniques in ...
Fragkiskos Papadopoulos, Konstantinos Psounis, Ram...
CL
2010
Springer
13 years 7 months ago
Cost-driven autonomous mobility
Autonomous mobile programs (AMPs) offer a novel decentralised load management technology where periodic use is made of cost models to decide where to execute in a network. In this...
Xiao Yan Deng, Greg Michaelson, Philip W. Trinder
GECCO
2008
Springer
121views Optimization» more  GECCO 2008»
13 years 8 months ago
Fast rule representation for continuous attributes in genetics-based machine learning
Genetic-Based Machine Learning Systems (GBML) are comparable in accuracy with other learning methods. However, efficiency is a significant drawback. This paper presents a new rep...
Jaume Bacardit, Natalio Krasnogor
ATAL
2010
Springer
13 years 8 months ago
Exploiting scale invariant dynamics for efficient information propagation in large teams
Large heterogeneous teams will often be in situations where sensor data that is uncertain and conflicting is shared across a peer-to-peer network. Not every team member will have ...
Robin Glinton, Paul Scerri, Katia P. Sycara