Sciweavers

5344 search results - page 192 / 1069
» Privacy-Preserving Set Operations
Sort
View
IPPS
2009
IEEE
15 years 10 months ago
Resource allocation strategies for constructive in-network stream processing
We consider the operator mapping problem for in-network stream processing, i.e., the application of a tree of operators in steady-state to multiple data objects that are continuou...
Anne Benoit, Henri Casanova, Veronika Rehn-Sonigo,...
ATAL
2009
Springer
15 years 10 months ago
Roles and norms for programming agent organizations
We present a programming language for implementing multiagent systems consisting of a set of individual agents that interact with a computational organization specified in terms ...
Nick A. M. Tinnemeier, Mehdi Dastani, John-Jules C...
APLAS
2009
ACM
15 years 10 months ago
The Higher-Order, Call-by-Value Applied Pi-Calculus
We define a higher-order process calculus with algebraic operations such as encryption and decryption, and develop a bisimulation proof method for behavioral equivalence in this c...
Nobuyuki Sato, Eijiro Sumii
114
Voted
FDG
2009
ACM
15 years 10 months ago
Very fast action selection for parameterized behaviors
In this paper, I will discuss a set of techniques for supporting limited variable binding in behavior-based systems. This adds additional useful expressivity while preserving the ...
Ian Horswill
120
Voted
CODES
2008
IEEE
15 years 10 months ago
SPaC: a symbolic pareto calculator
The compositional computation of Pareto points in multi-dimensional optimization problems is an important means to efficiently explore the optimization space. This paper presents ...
Hamid Shojaei, Twan Basten, Marc Geilen, Phillip S...