Sciweavers

10907 search results - page 238 / 2182
» Constraint Based Strategies
Sort
View
DBSEC
2008
103views Database» more  DBSEC 2008»
15 years 1 days ago
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure
Abstract. When generalization algorithms are known to the public, an adversary can obtain a more precise estimation of the secret table than what can be deduced from the disclosed ...
Lei Zhang 0004, Lingyu Wang, Sushil Jajodia, Alexa...
ENTCS
2008
101views more  ENTCS 2008»
14 years 11 months ago
Rewriting Strategies in Java
In any language designed to express transformations, the notion of rewrite rule is a key feature. Its conciseness as well as its strong theoretical foundations are essential. The ...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
IS
2010
14 years 9 months ago
Identifying user strategies in exploratory learning with evolving task modelling
Abstract—In this paper we present work on adaptive identification of learners’ strategies, gradually developing a higher level of adaptation based on evolving models of mathem...
Mihaela Cocea, George D. Magoulas
PDCAT
2005
Springer
15 years 4 months ago
Gracefully Degrading Battery-Aware Static Multiprocessor Schedules Based on Symmetric Task Fusion
A novel strategy for employing schedules obtained using standard static scheduling algorithms in a battery powered multiprocessor environment is investigated. The strategy is able...
Frode Eika Sandnes, Oliver Sinnen, Yo-Ping Huang
CONTEXT
2005
Springer
15 years 4 months ago
Impact of the signal control strategy on red light running
This article concerns red-light running at intersections and deals with the impact of different types of control strategies. Red running occurrences at red onset are observed throu...
Sophie Midenet