Sciweavers

1986 search results - page 324 / 398
» constraints 2006
Sort
View
VALUETOOLS
2006
ACM
113views Hardware» more  VALUETOOLS 2006»
14 years 4 months ago
Load prediction models in web-based systems
Run-time management of modern Web-based services requires the integration of several algorithms and mechanisms for job dispatching, load sharing, admission control, overload detec...
Mauro Andreolini, Sara Casolari
WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
14 years 4 months ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...
SAFECOMP
2004
Springer
14 years 3 months ago
Using Fuzzy Self-Organising Maps for Safety Critical Systems
This paper defines a type of constrained artificial neural network (ANN) that enables analytical certification arguments whilst retaining valuable performance characteristics. ...
Zeshan Kurd, Tim Kelly
PKDD
2009
Springer
184views Data Mining» more  PKDD 2009»
14 years 2 months ago
Boosting Active Learning to Optimality: A Tractable Monte-Carlo, Billiard-Based Algorithm
Abstract. This paper focuses on Active Learning with a limited number of queries; in application domains such as Numerical Engineering, the size of the training set might be limite...
Philippe Rolet, Michèle Sebag, Olivier Teyt...
ATAL
2007
Springer
14 years 2 months ago
MAGENTA technology case studies of magenta i-scheduler for road transportation
The paper describes functionality of Magenta Multi-Agent Logistics i-Scheduler Engine presented on AAMAS 2006 conferences and gives examples of its application in business domain....
Petr Skobelev, Andrey Glaschenko, Ilya Grachev, Se...