Sciweavers

1207 search results - page 138 / 242
» Towards optimal k-anonymization
Sort
View
MIDDLEWARE
2009
Springer
14 years 4 months ago
Rhizoma: A Runtime for Self-deploying, Self-managing Overlays
Abstract. The trend towards cloud and utility computing infrastructures raises challenges not only for application development, but also for management: diverse resources, changing...
Qin Yin, Adrian Schüpbach, Justin Cappos, And...
CEC
2008
IEEE
14 years 4 months ago
Natural Evolution Strategies
— This paper presents Natural Evolution Strategies (NES), a novel algorithm for performing real-valued ‘black box’ function optimization: optimizing an unknown objective func...
Daan Wierstra, Tom Schaul, Jan Peters, Jürgen...
INFOCOM
2008
IEEE
14 years 4 months ago
Cross-Monotonic Multicast
—In the routing and cost sharing of multicast towards a group of potential receivers, cross-monotonicity is a property that states a user’s payment can only be smaller when ser...
Zongpeng Li
NOMS
2008
IEEE
132views Communications» more  NOMS 2008»
14 years 4 months ago
Improving distributed service management using Service Modeling Language (SML)
—Automatic service and application deployment and management is becoming possible through the use of service and infrastructure discovery and policy systems. But using the infras...
Robert Adams, Ricardo Rivaldo, Guilherme Germoglio...
PARA
2004
Springer
14 years 3 months ago
Automatic Derivation of Linear Algebra Algorithms with Application to Control Theory
It is our belief that the ultimate automatic system for deriving linear algebra libraries should be able to generate a set of algorithms starting from the mathematical specificati...
Paolo Bientinesi, Sergey Kolos, Robert A. van de G...