Sciweavers

948 search results - page 136 / 190
» What can we achieve by arbitrary announcements
Sort
View
OSDI
2008
ACM
14 years 9 months ago
SQCK: A Declarative File System Checker
The lowly state of the art for file system checking and repair does not match what is needed to keep important data available for users. Current file system checkers, such as e2fs...
Haryadi S. Gunawi, Abhishek Rajimwale, Andrea C. A...
EVOW
2009
Springer
14 years 3 months ago
Evolutionary Optimization Guided by Entropy-Based Discretization
The Learnable Evolution Model (LEM) involves alternating periods of optimization and learning, performa extremely well on a range of problems, a specialises in achieveing good resu...
Guleng Sheri, David W. Corne
ATAL
2007
Springer
14 years 3 months ago
Marginal Bidding: An Application of the Equimarginal Principle to Bidding in TAC SCM
Abstract. We present a fast and effective bidding strategy for the Trading Agent Competition in Supply Chain Management (TAC SCM). In TAC SCM, manufacturers compete to procure com...
Amy R. Greenwald, Victor Naroditskiy, Tyler Odean,...
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song
OTM
2005
Springer
14 years 2 months ago
OWL-Based User Preference and Behavior Routine Ontology for Ubiquitous System
In ubiquitous computing, behavior routine learning is the process of mining the context-aware data to find interesting rules on the user’s behavior, while preference learning tri...
Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee