Sciweavers

8298 search results - page 1578 / 1660
» On the Complexity of Numerical Analysis
Sort
View
ESOP
2005
Springer
15 years 3 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
GD
2005
Springer
15 years 3 months ago
D-Dupe: An Interactive Tool for Entity Resolution in Social Networks
Visualizing and analyzing social networks is a challenging problem that has been receiving growing attention. An important first step, before analysis can begin, is ensuring that...
Mustafa Bilgic, Louis Licamele, Lise Getoor, Ben S...
GECCO
2005
Springer
140views Optimization» more  GECCO 2005»
15 years 3 months ago
Intransitivity revisited coevolutionary dynamics of numbers games
Relative fitness, or “evaluation by tests” is one of the building blocks of coevolution: the only fitness information available is a comparison with other individuals in a p...
Pablo Funes, Enrique Pujals
GECCO
2005
Springer
125views Optimization» more  GECCO 2005»
15 years 3 months ago
Schema disruption in tree-structured chromosomes
We study if and when the inequality dp(H) ≤ rel∆(H) holds for schemas H in chromosomes that are structured as trees. The disruption probability dp(H) is the probability that a...
William A. Greene
IPSN
2005
Springer
15 years 3 months ago
Matched source-channel communication for field estimation in wireless sensor networks
Abstract— Sensing, processing and communication must be jointly optimized for efficient operation of resource-limited wireless sensor networks. We propose a novel source-channel...
Waheed Uz Zaman Bajwa, Akbar M. Sayeed, Robert D. ...
« Prev « First page 1578 / 1660 Last » Next »