Sciweavers

19130 search results - page 3499 / 3826
» Modelling multi-path problems
Sort
View
PVLDB
2010
168views more  PVLDB 2010»
15 years 2 months ago
Active Complex Event Processing: Applications in Real-Time Health Care
Our analysis of many real-world event based applications has revealed that existing Complex Event Processing technology (CEP), while effective for efficient pattern matching on e...
Di Wang, Elke A. Rundensteiner, Richard Ellison, H...
PVLDB
2010
179views more  PVLDB 2010»
15 years 2 months ago
MRShare: Sharing Across Multiple Queries in MapReduce
Large-scale data analysis lies in the core of modern enterprises and scientific research. With the emergence of cloud computing, the use of an analytical query processing infrast...
Tomasz Nykiel, Michalis Potamias, Chaitanya Mishra...
SAB
2010
Springer
117views Optimization» more  SAB 2010»
15 years 2 months ago
Indirectly Encoding Neural Plasticity as a Pattern of Local Rules
Biological brains can adapt and learn from past experience. In neuroevolution, i.e. evolving artificial neural networks (ANNs), one way that agents controlled by ANNs can evolve t...
Sebastian Risi, Kenneth O. Stanley
SAS
2010
Springer
143views Formal Methods» more  SAS 2010»
15 years 2 months ago
Points-to Analysis as a System of Linear Equations
The efficiency of a points-to analysis is critical for several compiler optimizations and transformations, and has attracted considerable research attention. Despite several advanc...
Rupesh Nasre, Ramaswamy Govindarajan
SCN
2010
Springer
145views Communications» more  SCN 2010»
15 years 2 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
« Prev « First page 3499 / 3826 Last » Next »