Sciweavers

131 search results - page 22 / 27
» Solution Enumeration for Projected Boolean Search Problems
Sort
View
ESORICS
2007
Springer
14 years 28 days ago
Encryption Techniques for Secure Database Outsourcing
Abstract. While the idea of database outsourcing is becoming increasingly popular, the associated security risks still prevent many potential users from deploying it. In particular...
Sergei Evdokimov, Oliver Günther
ATAL
2003
Springer
13 years 12 months ago
Cooperative negotiation for soft real-time distributed resource allocation
In this paper we present a cooperative negotiation protocol that solves a distributed resource allocation problem while conforming to soft real-time constraints in a dynamic envir...
Roger Mailler, Victor R. Lesser, Bryan Horling
EDBT
2009
ACM
138views Database» more  EDBT 2009»
14 years 1 months ago
FOGGER: an algorithm for graph generator discovery
To our best knowledge, all existing graph pattern mining algorithms can only mine either closed, maximal or the complete set of frequent subgraphs instead of graph generators whic...
Zhiping Zeng, Jianyong Wang, Jun Zhang, Lizhu Zhou
ICCV
2009
IEEE
14 years 11 months ago
Globally Optimal Affine Epipolar Geometry from Apparent Contours
We study the problem of estimating the epipolar geometry from apparent contours of smooth curved surfaces with affine camera models. Since apparent contours are viewpoint depend...
Gang Li, Yanghai Tsin
GECCO
2008
Springer
363views Optimization» more  GECCO 2008»
13 years 7 months ago
Towards high speed multiobjective evolutionary optimizers
One of the major difficulties when applying Multiobjective Evolutionary Algorithms (MOEA) to real world problems is the large number of objective function evaluations. Approximate...
A. K. M. Khaled Ahsan Talukder