Sciweavers

5344 search results - page 316 / 1069
» Privacy-Preserving Set Operations
Sort
View
FDL
2005
IEEE
15 years 10 months ago
Meta Modelling of Embedded Systems using Active Databases
The development process of embedded systems is characterized by the cooperation of various domains: components of hardware and software have to be considered as well as components...
Dieter Monjau, Mathias Sporer
HICSS
2005
IEEE
101views Biometrics» more  HICSS 2005»
15 years 10 months ago
Attention and Communication: Decision Scenarios for Teleoperating Robots
The economics of robot manufacturing is driving us toward situations in which a single human operator will be expected to split attention across multiple semiautonomous vehicles, ...
Jeffrey V. Nickerson, Steven Skiena
SPAA
2005
ACM
15 years 10 months ago
Concurrent cache-oblivious b-trees
This paper presents concurrent cache-oblivious (CO) B-trees. We extend the cache-oblivious model to a parallel or distributed setting and present three concurrent CO B-trees. Our ...
Michael A. Bender, Jeremy T. Fineman, Seth Gilbert...
FOSSACS
2005
Springer
15 years 10 months ago
Expressivity of Coalgebraic Modal Logic: The Limits and Beyond
Modal logic has a good claim to being the logic of choice for describing the reactive behaviour of systems modeled as coalgebras. Logics with modal operators obtained from so-calle...
Lutz Schröder
GECCO
2005
Springer
127views Optimization» more  GECCO 2005»
15 years 10 months ago
The enhanced evolutionary tabu search and its application to the quadratic assignment problem
We describe the Enhanced Evolutionary Tabu Search (EE-TS) local search technique. The EE-TS metaheuristic technique combines Reactive Tabu Search with evolutionary computing eleme...
John F. McLoughlin III, Walter Cedeño