Sciweavers

29143 search results - page 5627 / 5829
» A Sortation System Model
Sort
View
EELC
2006
118views Languages» more  EELC 2006»
15 years 7 months ago
Lexicon Convergence in a Population With and Without Metacommunication
How does a shared lexicon arise in population of agents with differing lexicons, and how can this shared lexicon be maintained over multiple generations? In order to get some insig...
Zoran Macura, Jonathan Ginzburg
146
Voted
ERCIMDL
2006
Springer
161views Education» more  ERCIMDL 2006»
15 years 7 months ago
Scalable Semantic Overlay Generation for P2P-Based Digital Libraries
The advent of digital libraries along with the tremendous growth of digital content call for distributed and scalable approaches for managing vast data collections. Peer-to-peer (P...
Christos Doulkeridis, Kjetil Nørvåg, ...
ESOA
2006
15 years 7 months ago
Greedy Cheating Liars and the Fools Who Believe Them
Evolutionary algorithms based on "tags" can be adapted to induce cooperation in selfish environments such as peer-to-peer systems. In this approach, nodes periodically co...
Stefano Arteconi, David Hales, Özalp Babaoglu
ESOP
2006
Springer
15 years 7 months ago
Haskell Is Not Not ML
We present a typed calculus IL ("intermediate language") which supports the embedding of ML-like (strict, eager) and Haskell-like (non-strict, lazy) languages, without fa...
Ben Rudiak-Gould, Alan Mycroft, Simon L. Peyton Jo...
138
Voted
ETRICS
2006
15 years 7 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
« Prev « First page 5627 / 5829 Last » Next »