Sciweavers

7167 search results - page 1399 / 1434
» Answer Set Programming
Sort
View
MOBICOM
2010
ACM
15 years 20 days ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
4OR
2010
137views more  4OR 2010»
15 years 18 days ago
Extended formulations in combinatorial optimization
This survey is concerned with the size of perfect formulations for combinatorial optimization problems. By "perfect formulation", we mean a system of linear inequalities...
Michele Conforti, Gérard Cornuéjols,...
115
Voted
AAMAS
2008
Springer
15 years 18 days ago
Using quantitative models to search for appropriate organizational designs
As the scale and scope of distributed and multi-agent systems grow, it becomes increasingly important to design and manage the participants' interactions. The potential for b...
Bryan Horling, Victor R. Lesser
90
Voted
AI
2010
Springer
15 years 18 days ago
Interactive semantics
instruments. A melody expresses abstract artistic conception or emotion. The explanation ability plays the key role in the externalization and internalization from one form of expr...
Hai Zhuge
99
Voted
ALMOB
2008
85views more  ALMOB 2008»
15 years 18 days ago
Noisy: Identification of problematic columns in multiple sequence alignments
Motivation: Sequence-based methods for phylogenetic reconstruction from (nucleic acid) sequence data are notoriously plagued by two effects: homoplasies and alignment errors. Larg...
Andreas W. M. Dress, Christoph Flamm, Guido Fritzs...
« Prev « First page 1399 / 1434 Last » Next »