Sciweavers

5344 search results - page 187 / 1069
» Privacy-Preserving Set Operations
Sort
View
GECCO
2009
Springer
15 years 10 months ago
The relationship between evolvability and bloat
Bloat is a common problem with Evolutionary Algorithms (EAs) that use variable length representation. By creating unnecessarily large individuals it results in longer EA runtimes ...
Jeffrey K. Bassett, Mark Coletti, Kenneth A. De Jo...
VLDB
2007
ACM
110views Database» more  VLDB 2007»
15 years 9 months ago
GeRoMeSuite: A System for Holistic Generic Model Management
Manipulation of models and mappings is a common task in the design and development of information systems. Research in Model Management aims at supporting these tasks by providing...
David Kensche, Christoph Quix, Xiang Li 0002, Yong...
DATE
2006
IEEE
118views Hardware» more  DATE 2006»
15 years 9 months ago
Design and implementation of a modular and portable IEEE 754 compliant floating-point unit
Multimedia and communication algorithms from embedded system domain often make extensive use of floating-point arithmetic. Due to the complexity and expense of the floating-poin...
Kingshuk Karuri, Rainer Leupers, Gerd Ascheid, Hei...
124
Voted
DALT
2005
Springer
15 years 9 months ago
Resource-Bounded Belief Revision and Contraction
Agents need to be able to change their beliefs; in particular, they should be able to contract or remove a certain belief in order to restore consistency to their set of beliefs, a...
Natasha Alechina, Mark Jago, Brian Logan
107
Voted
SIGOPSE
2004
ACM
15 years 8 months ago
An approach to benchmarking configuration complexity
Configuration is the process whereby components are assembled or adjusted to produce a functional system that operates at a specified level of performance. Today, the complexity o...
Aaron B. Brown, Joseph L. Hellerstein