Sciweavers

2457 search results - page 423 / 492
» Local Search with Bootstrapping
Sort
View
CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
14 years 11 months ago
Oblivious RAM Revisited
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a client, that can store locally only a constant amount of data, to store remotely ...
Benny Pinkas, Tzachy Reinman
HPDC
2010
IEEE
14 years 11 months ago
Efficient querying of distributed provenance stores
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
Ashish Gehani, Minyoung Kim, Tanu Malik
GECCO
2008
Springer
137views Optimization» more  GECCO 2008»
14 years 11 months ago
Evolutionary path planner for UAVs in realistic environments
This paper presents a path planner for Unmanned Air Vehicles (UAVs) based on Evolutionary Algorithms (EA) that can be used in realistic risky scenarios. The path returned by the a...
Jesús Manuel de la Cruz, Eva Besada-Portas,...
GECCO
2008
Springer
175views Optimization» more  GECCO 2008»
14 years 11 months ago
Non-genetic transmission of memes by diffusion
In recent years, there has been an increase in research activities on Memetic Algorithm (MA). MA works with memes; a meme being defined as “the basic unit of cultural transmiss...
Quang Huy Nguyen 0001, Yew-Soon Ong, Meng-Hiot Lim
GECCO
2008
Springer
168views Optimization» more  GECCO 2008»
14 years 11 months ago
Parameterizing pair approximations for takeover dynamics
Pair approximations have often been used to predict equilibrium conditions in spatially-explicit epidemiological and ecological systems. In this work, we investigate whether this ...
Joshua L. Payne, Margaret J. Eppstein