Sciweavers

17288 search results - page 3186 / 3458
» Hybrid Optimizations: Which Optimization Algorithm to Use
Sort
View
FPL
2008
Springer
103views Hardware» more  FPL 2008»
15 years 6 months ago
No-break dynamic defragmentation of reconfigurable devices
We propose a new method for defragmenting the module layout of a reconfigurable device, enabled by a novel approach for dealing with communication needs between relocated modules ...
Sándor P. Fekete, Tom Kamphans, Nils Schwee...
AAAI
2010
15 years 6 months ago
Towards Multiagent Meta-level Control
Embedded systems consisting of collaborating agents capable of interacting with their environment are becoming ubiquitous. It is crucial for these systems to be able to adapt to t...
Shanjun Cheng, Anita Raja, Victor R. Lesser
ICWS
2007
IEEE
15 years 6 months ago
A Query-based System for Automatic Invocation of Web Services
There is a critical need to design and develop tools tract away the fundamental complexity of XML based Web services specifications and toolkits, and provide an elegant, intuitive...
Chaitali Gupta, Rajdeep Bhowmik, Michael R. Head, ...
138
Voted
OPODIS
2008
15 years 6 months ago
Byzantine Consensus with Unknown Participants
Abstract. Consensus is a fundamental building block used to solve many practical problems that appear on reliable distributed systems. In spite of the fact that consensus is being ...
Eduardo Adílio Pelinson Alchieri, Alysson N...
182
Voted
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
15 years 6 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...
« Prev « First page 3186 / 3458 Last » Next »