Sciweavers

5344 search results - page 147 / 1069
» Privacy-Preserving Set Operations
Sort
View
GECCO
2007
Springer
150views Optimization» more  GECCO 2007»
15 years 9 months ago
Credit assignment in adaptive memetic algorithms
Adaptive Memetic Algorithms couple an evolutionary algorithm with a number of local search heuristics for improving the evolving solutions. They are part of a broad family of meta...
J. E. Smith
ALGORITHMICA
2005
135views more  ALGORITHMICA 2005»
15 years 3 months ago
Queaps
A new priority queue structure, the queap, is introduced. The queap executes insertion in O(1) amortized time and extract-min in O(log(k+2)) amortized time if there are k items th...
John Iacono, Stefan Langerman
JELIA
2004
Springer
15 years 8 months ago
Two Approaches to Merging Knowledge Bases
We present a framework for expressing different merging operators for belief sets. This framework is a generalisation of our earlier work concerning consistency-based belief revisi...
James P. Delgrande, Torsten Schaub
NMR
2004
Springer
15 years 8 months ago
Consistency-based approaches to merging knowledge bases: preliminary report
We present a framework for investigating merging operators for belief sets. This framework is a generalisation of our earlier work concerning consistency-based belief revision and...
James P. Delgrande, Torsten Schaub
CONCUR
1994
Springer
15 years 7 months ago
Weak Sequential Composition in Process Algebras
Abstract. In this paper we study a special operator for sequential composition, which is de ned relative to a dependency relation over the actions of a given system. The idea is th...
Arend Rensink, Heike Wehrheim