Sciweavers

1332 search results - page 109 / 267
» ideas 2008
Sort
View
CIKM
2008
Springer
15 years 5 months ago
Protecting location privacy against location-dependent attack in mobile services
Privacy preservation has recently received considerable attention for location-based mobile services. In this paper, we present location-dependent attack resulting from continuous...
Xiao Pan, Jianliang Xu, Xiaofeng Meng
FOCS
2008
IEEE
15 years 5 months ago
Quantum Multi Prover Interactive Proofs with Communicating Provers
We introduce another variant of Quantum MIP, where the provers do not share entanglement, the communication between the verifier and the provers is quantum, but the provers are u...
Michael Ben-Or, Avinatan Hassidim, Haran Pilpel
FSTTCS
2008
Springer
15 years 5 months ago
Boolean algebras of unambiguous context-free languages
Several recent works have studied subfamilies of deterministic context-free languages with good closure properties, for instance the families of input-driven or visibly pushdown la...
Didier Caucal
GECCO
2008
Springer
160views Optimization» more  GECCO 2008»
15 years 5 months ago
An estimation distribution algorithm with the spearman's rank correlation index
This article arguments that rank correlation coefficients are powerful association measures and how can they be adopted by EDAs. A new EDA implements the proposed ideas: the Non-P...
Arturo Hernández Aguirre, Enrique Raú...
GECCO
2008
Springer
145views Optimization» more  GECCO 2008»
15 years 5 months ago
Towards incremental social learning in optimization and multiagent systems
Social learning is a mechanism that allows individuals to acquire knowledge from others without incurring the costs of acquiring it individually. Individuals that learn socially c...
Marco Antonio Montes de Oca, Thomas Stützle