Sciweavers

1221 search results - page 68 / 245
» A Comparison of Two Programming Models for Pervasive Computi...
Sort
View
ANOR
2011
96views more  ANOR 2011»
14 years 10 months ago
Global propagation of side constraints for solving over-constrained problems
This article deals with the resolution of over-constrained problems using constraint programming, which often imposes to add to the constraint network new side constraints. These ...
Thierry Petit, Emmanuel Poder
PPSN
2004
Springer
15 years 8 months ago
Constrained Evolutionary Optimization by Approximate Ranking and Surrogate Models
Abstract. The paper describes an evolutionary algorithm for the general nonlinear programming problem using a surrogate model. Surrogate models are used in optimization when model ...
Thomas Philip Runarsson
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
15 years 8 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya
ACL
2010
15 years 1 months ago
Minimized Models and Grammar-Informed Initialization for Supertagging with Highly Ambiguous Lexicons
We combine two complementary ideas for learning supertaggers from highly ambiguous lexicons: grammar-informed tag transitions and models minimized via integer programming. Each st...
Sujith Ravi, Jason Baldridge, Kevin Knight
BMVC
1998
15 years 4 months ago
A Comparative Study of Rotation Invariant Classification and Retrieval of Texture Images
This paper presents a detailed comparative study of 4 rotation invariant texture analysis methods. Human subjects are included as a benchmark for the computational methods. Experi...
Stephanie R. Fountain, Tieniu Tan, Keith D. Baker