Sciweavers

298 search results - page 43 / 60
» Towards experimental evaluation of code obfuscation techniqu...
Sort
View
CPAIOR
2009
Springer
14 years 3 months ago
Learning How to Propagate Using Random Probing
Abstract. In constraint programming there are often many choices regarding the propagation method to be used on the constraints of a problem. However, simple constraint solvers usu...
Efstathios Stamatatos, Kostas Stergiou
IWCMC
2006
ACM
14 years 2 months ago
Budgeting power: packet duplication and bit error rate reduction in wireless ad-hoc networks
In this paper we present and evaluate a new technique to lower packet-level error rates of application layer connections in wireless ad-hoc networks. In our scheme, data packets s...
Ghassen Ben Brahim, Bilal Khan
ESAW
2008
Springer
13 years 10 months ago
Contribution to the Control of a MAS's Global Behaviour: Reinforcement Learning Tools
Reactive multi-agent systems present global behaviours uneasily linked to their local dynamics. When it comes to controlling such a system, usual analytical tools are difficult to ...
François Klein, Christine Bourjot, Vincent ...
AAAI
2006
13 years 10 months ago
Mixed Collaborative and Content-Based Filtering with User-Contributed Semantic Features
We describe a recommender system which uses a unique combination of content-based and collaborative methods to suggest items of interest to users, and also to learn and exploit it...
Matthew Garden, Gregory Dudek
MICRO
2006
IEEE
135views Hardware» more  MICRO 2006»
14 years 2 months ago
Support for High-Frequency Streaming in CMPs
As the industry moves toward larger-scale chip multiprocessors, the need to parallelize applications grows. High inter-thread communication delays, exacerbated by over-stressed hi...
Ram Rangan, Neil Vachharajani, Adam Stoler, Guilhe...