Sciweavers

664 search results - page 121 / 133
» Solution to the Counterfeit Coin Problem and its Generalizat...
Sort
View
GECCO
2003
Springer
112views Optimization» more  GECCO 2003»
14 years 1 months ago
Limits in Long Path Learning with XCS
The development of the XCS Learning Classifier System [26] has produced a stable implementation, able to consistently identify the accurate and optimally general population of cla...
Alwyn Barry
PODC
2010
ACM
14 years 9 days ago
Finding mobile data under delay constraints with searching costs
A token is hidden in one of several boxes and then the boxes are locked. The probability of placing the token in each of the boxes is known. A searcher is looking for the token by...
Amotz Bar-Noy, Panagiotis Cheilaris, Yi Feng 0002,...
DLOG
2003
13 years 9 months ago
Conceptual Modeling with Description Logics
The purpose of the chapter is to help someone familiar with DLs to understand the issues involved in developing an ontology for some universe of discourse, which is to become a co...
Alexander Borgida, Ronald J. Brachman
WIOPT
2010
IEEE
13 years 6 months ago
Reservation policies for revenue maximization from secondary spectrum access in cellular networks
We consider the problem of providing opportunistic spectrum access to secondary users in wireless cellular networks. From the standpoint of spectrum license holders, achieving ben...
Ashraf Al Daoud, Murat Alanyali, David Starobinski
ICSE
2003
IEEE-ACM
14 years 8 months ago
The Grand Challenge of Trusted Components
Reusable components equipped with strict guarantees of quality can help reestablish software development on a stronger footing, by taking advantage of the scaling effect of reuse ...
Bertrand Meyer