Sciweavers

1363 search results - page 202 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
STOC
1994
ACM
168views Algorithms» more  STOC 1994»
15 years 3 months ago
Fast algorithms for finding randomized strategies in game trees
Interactions among agents can be conveniently described by game trees. In order to analyze a game, it is important to derive optimal (or equilibrium) strategies for the di erent p...
Daphne Koller, Nimrod Megiddo, Bernhard von Stenge...
74
Voted
AOSD
2007
ACM
15 years 3 months ago
Aspect-oriented application-level scheduling for J2EE servers
Achieving sufficient execution performance is a challenging goal of software development. Unfortunately, violating performance requirements is often revealed at a late stage of th...
Kenichi Kourai, Hideaki Hibino, Shigeru Chiba
KDD
2010
ACM
310views Data Mining» more  KDD 2010»
15 years 3 months ago
An integrated machine learning approach to stroke prediction
Stroke is the third leading cause of death and the principal cause of serious long-term disability in the United States. Accurate prediction of stroke is highly valuable for early...
Aditya Khosla, Yu Cao, Cliff Chiung-Yu Lin, Hsu-Ku...
GIS
2007
ACM
15 years 3 months ago
Optimal traversal planning in road networks with navigational constraints
A frequent query in geospatial planning and decision making domains (e.g., emergency response, data acquisition, street cleaning), is to find an optimal traversal plan (OTP) that ...
Leyla Kazemi, Cyrus Shahabi, Mehdi Sharifzadeh, Lu...
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
15 years 2 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni