Sciweavers

551 search results - page 90 / 111
» On the design of metaheuristic algorithms using fuzzy rules
Sort
View
176
Voted
SIGMOD
2008
ACM
164views Database» more  SIGMOD 2008»
15 years 9 months ago
Finding frequent items in probabilistic data
Computing statistical information on probabilistic data has attracted a lot of attention recently, as the data generated from a wide range of data sources are inherently fuzzy or ...
Qin Zhang, Feifei Li, Ke Yi
EH
1999
IEEE
351views Hardware» more  EH 1999»
15 years 2 months ago
Evolvable Hardware or Learning Hardware? Induction of State Machines from Temporal Logic Constraints
Here we advocate an approach to learning hardware based on induction of finite state machines from temporal logic constraints. The method involves training on examples, constraint...
Marek A. Perkowski, Alan Mishchenko, Anatoli N. Ch...
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
15 years 10 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
PPAM
2007
Springer
15 years 3 months ago
Alea - Grid Scheduling Simulation Environment
This work concentrates on the design of a system intended for study of advanced scheduling techniques for planning various types of jobs in a Grid environment. The solution is able...
Dalibor Klusácek, Ludek Matyska, Hana Rudov...
CIKM
2007
Springer
15 years 3 months ago
Finding and linking incidents in news
News reports are being produced and disseminated in overwhelming volume, making it difficult to keep up with the newest information. Most previous research in automatic news organ...
Ao Feng, James Allan