Sciweavers

1712 search results - page 283 / 343
» A Computational Approach to Binding Theory
Sort
View
CCS
2005
ACM
15 years 7 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
DSOM
2005
Springer
15 years 7 months ago
Control Considerations for Scalable Event Processing
The growth in the scale of systems and networks has created many challenges for their management, especially for event processing. Our premise is that scaling event processing requ...
Wei Xu, Joseph L. Hellerstein, Bill Kramer, David ...
GECCO
2005
Springer
122views Optimization» more  GECCO 2005»
15 years 7 months ago
An enhanced GA to improve the search process reliability in tuning of control systems
Evolutionary Algorithms (EAs) have been largely applied to optimisation and synthesis of controllers. In spite of several successful applications and competitive solutions, the st...
Andrea Soltoggio
IWQOS
2005
Springer
15 years 7 months ago
A High-Throughput Overlay Multicast Infrastructure with Network Coding
Network coding has been recently proposed in information theory as a new dimension of the information multicast problem that helps achieve optimal transmission rate or cost. End ho...
Mea Wang, Zongpeng Li, Baochun Li
LAMAS
2005
Springer
15 years 7 months ago
An Overview of Cooperative and Competitive Multiagent Learning
Abstract Multi-agent systems (MASs) is an area of distributed artificial intelligence that emphasizes the joint behaviors of agents with some degree of autonomy and the complexiti...
Pieter Jan't Hoen, Karl Tuyls, Liviu Panait, Sean ...