Sciweavers

7167 search results - page 451 / 1434
» Answer Set Programming
Sort
View
JUCS
2010
159views more  JUCS 2010»
14 years 10 months ago
Authoring of Probabilistic Sequencing in Adaptive Hypermedia with Bayesian Networks
Abstract: One of the difficulties that self-directed learners face on their learning process is choosing the right learning resources. One of the goals of adaptive educational syst...
Sergio Gutiérrez Santos, Jaime Mayor-Berzal...
ICDT
2011
ACM
213views Database» more  ICDT 2011»
14 years 7 months ago
On provenance and privacy
Provenance in scientific workflows is a double-edged sword. On the one hand, recording information about the module executions used to produce a data item, as well as the parame...
Susan B. Davidson, Sanjeev Khanna, Sudeepa Roy, Ju...
170
Voted
ASIACRYPT
2011
Springer
14 years 3 months ago
Noiseless Database Privacy
Differential Privacy (DP) has emerged as a formal, flexible framework for privacy protection, with a guarantee that is agnostic to auxiliary information and that admits simple ru...
Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Sr...
CP
2009
Springer
16 years 4 months ago
Solving a Location-Allocation Problem with Logic-Based Benders' Decomposition
Abstract. We address a location-allocation problem that requires deciding the location of a set of facilities, the allocation of customers to those facilities under facility capaci...
Mohammad M. Fazel-Zarandi, J. Christopher Beck
131
Voted
POPL
2009
ACM
15 years 10 months ago
Comparing the performance of concurrent linked-list implementations in Haskell
Haskell has a rich set of synchronization primitives for implemented-state concurrency abstractions, ranging from the very high level (Software Transactional Memory) to the very l...
Martin Sulzmann, Edmund S. L. Lam, Simon Marlow