Sciweavers

2844 search results - page 90 / 569
» A Comparison of Partitioning Operating Systems for Integrate...
Sort
View
AUSAI
2005
Springer
15 years 6 months ago
A Comparison of Evolutionary Methods for the Discovery of Local Search Heuristics
Abstract. Methods of adaptive constraint satisfaction have recently become of interest to overcome the limitations imposed on “black-box” search algorithms by the no free lunch...
Stuart Bain, John Thornton, Abdul Sattar
USS
2008
15 years 6 months ago
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems
In light of the systemic vulnerabilities uncovered by recent reviews of deployed e-voting systems, the surest way to secure the voting process would be to scrap the existing syste...
J. Alex Halderman, Eric Rescorla, Hovav Shacham, D...
USENIX
2007
15 years 6 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
NAACL
2004
15 years 5 months ago
Optimizing Automated Call Routing by Integrating Spoken Dialog Models with Queuing Models
Organizations are increasingly turning to spoken dialog systems for automated call routing to reduce call center costs. To maintain quality service even in cases of failure, these...
Tim Paek, Eric Horvitz
TJS
2010
72views more  TJS 2010»
15 years 2 months ago
u-BabSang: a context-aware food recommendation system
In this paper, we propose a context-aware food recommendation system for well-being care applications. The proposed system, called u-BabSang, provides individualized food recommend...
Yoosoo Oh, Ahyoung Choi, Woontack Woo