Sciweavers

1512 search results - page 72 / 303
» When Suboptimal Rules
Sort
View
ATAL
2007
Springer
14 years 4 months ago
Average-case tractability of manipulation in voting via the fraction of manipulators
Recent results have established that a variety of voting rules are computationally hard to manipulate in the worst-case; this arguably provides some guarantee of resistance to man...
Ariel D. Procaccia, Jeffrey S. Rosenschein
ISIPTA
2003
IEEE
110views Mathematics» more  ISIPTA 2003»
14 years 3 months ago
Extensions of Expected Utility Theory and Some Limitations of Pairwise Comparisons
We contrast three decision rules that extend Expected Utility to contexts where a convex set of probabilities is used to depict uncertainty: Γ-Maximin, Maximality, and E-admissib...
Mark J. Schervish, Teddy Seidenfeld, Joseph B. Kad...
AINA
2010
IEEE
14 years 3 months ago
A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
— Developing and managing firewall Access Control Lists (ACLs) are hard, time-consuming, and error-prone tasks for a variety of reasons. Complexity of networks is constantly incr...
Sergio Pozo, A. J. Varela-Vaca, Rafael M. Gasca
SIGMOD
1989
ACM
118views Database» more  SIGMOD 1989»
14 years 2 months ago
The Architecture Of An Active Data Base Management System
The HiPAC project is investigating active, time-constrained databasemanagment. An active DBMS is one which automatically executes specified actions when speciifed conditions arise...
Dennis R. McCarthy, Umeshwar Dayal
GG
2008
Springer
13 years 11 months ago
Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts
Behavior preservation, namely the fact that the behavior of a model is not altered by the transformations, is a crucial property in refactoring. The most common approaches to behav...
Guilherme Rangel, Leen Lambers, Barbara König...