Sciweavers

67 search results - page 3 / 14
» Where do helpers look
Sort
View
MASCOTS
2008
13 years 10 months ago
Finding Good Configurations in High-Dimensional Spaces: Doing More with Less
Manually tuning tens to hundreds of configuration parameters in a complex software system like a database or an application server is an arduous task. Recent work has looked into ...
Risi Thonangi, Vamsidhar Thummala, Shivnath Babu
CCO
2001
Springer
143views Combinatorics» more  CCO 2001»
14 years 1 months ago
TSP Cuts Which Do Not Conform to the Template Paradigm
Abstract. The first computer implementation of the Dantzig-FulkersonJohnson cutting-plane method for solving the traveling salesman problem, written by Martin, used subtour inequa...
David Applegate, Robert E. Bixby, Vasek Chvá...
PKC
2007
Springer
189views Cryptology» more  PKC 2007»
14 years 2 months ago
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
Benoît Libert, Jean-Jacques Quisquater, Moti...
ITS
2000
Springer
120views Multimedia» more  ITS 2000»
14 years 3 days ago
TEATRIX: Virtual Environment for Story Creation
This paper describes TEATRIX; a learning environment designed to help children, and their teachers, in the whole process of collaborative story creation. TEATRIX provides an enviro...
Rui Prada, Isabel Machado, Ana Paiva
CEC
2003
IEEE
14 years 5 days ago
Increasing the accuracy of a spam-detecting artificial immune system
AbstractSpam, the electronic equivalent of junk mail, affects over 600 million users worldwide. Even as anti-spam solutions change to limit the amount of spam sent to users, the se...
Terri Oda, Tony White