Sciweavers

918 search results - page 97 / 184
» e-Procurement Using Goal Programming
Sort
View
ICLP
1999
Springer
15 years 6 months ago
CLAIRE: Combining Sets, Search, and Rules to Better Express Algorithms
This paper presents a programming language that includes paradigms that are usually associated with declarative languages, such as sets, rules and search, into an imperative (funct...
Yves Caseau, François-Xavier Josset, Fran&c...
ICANN
1997
Springer
15 years 6 months ago
On Learning Soccer Strategies
We use simulated soccer to study multiagent learning. Each team's players (agents) share action set and policy but may behave differently due to position-dependent inputs. All...
Rafal Salustowicz, Marco Wiering, Jürgen Schm...
89
Voted
ECOOP
2006
Springer
15 years 5 months ago
The Runtime Structure of Object Ownership
Object-oriented programs often require large heaps to run properly or meet performance goals. They use high-overhead collections, bulky data models, and large caches. Discovering t...
Nick Mitchell
ISCA
1991
IEEE
162views Hardware» more  ISCA 1991»
15 years 5 months ago
Comparison of Hardware and Software Cache Coherence Schemes
We use mean value analysis models to compare representative hardware and software cache coherence schemes for a large-scale shared-memory system. Our goal is to identify the workl...
Sarita V. Adve, Vikram S. Adve, Mark D. Hill, Mary...
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 9 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...