Sciweavers

1223 search results - page 177 / 245
» An Attributive Logic of Set Descriptions and Set Operations
Sort
View
JIRS
2000
144views more  JIRS 2000»
14 years 9 months ago
An Integrated Approach of Learning, Planning, and Execution
Agents (hardware or software) that act autonomously in an environment have to be able to integrate three basic behaviors: planning, execution, and learning. This integration is man...
Ramón García-Martínez, Daniel...
HPDC
2008
IEEE
15 years 4 months ago
Ontological framework for a free-form query based grid search engine
If the model of free-form queries, which has proved successful for HTML based search on the Web, is made available for Grid services, it will serve as a powerful tool for scientis...
Chaitali Gupta, Rajdeep Bhowmik, Madhusudhan Govin...
ICDE
2008
IEEE
178views Database» more  ICDE 2008»
15 years 11 months ago
On the Optimal Selection of k in the k-Anonymity Problem
When disseminating data involving human subjects, researchers have to weigh in the requirements of privacy of the individuals involved in the data. A model widely used for enhancin...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
ICDE
2007
IEEE
113views Database» more  ICDE 2007»
15 years 11 months ago
Reducing Order Enforcement Cost in Complex Query Plans
Algorithms that exploit sort orders are widely used to implement joins, grouping, duplicate elimination and other set operations. Query optimizers traditionally deal with sort ord...
Ravindra Guravannavar, S. Sudarshan
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
15 years 4 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiï...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...