Sciweavers

5344 search results - page 341 / 1069
» Privacy-Preserving Set Operations
Sort
View
CPAIOR
2005
Springer
15 years 10 months ago
Filtering Algorithms for the NValue Constraint
Abstract. The NValue constraint counts the number of different values assigned to a vector of variables. Propagating generalized arc consistency on this constraint is NP-hard. We ...
Christian Bessière, Emmanuel Hebrard, Brahi...
EVOW
2005
Springer
15 years 10 months ago
Toward User-Directed Evolution of Sound Synthesis Parameters
Abstract. Experiments are described which use genetic algorithms operating on the parameter settings of an FM synthesizer, with the aim of mimicking known synthesized sounds. The w...
James McDermott, Niall J. L. Griffith, Michael O'N...
122
Voted
ISPEC
2005
Springer
15 years 10 months ago
Risk Assessment of Production Networks Using Honeynets - Some Practical Experience
: Threats for today’s production networks range from fully automated worms and viruses to targeted, highly sophisticated multi-phase attacks carried out manually. In order to pro...
Stephan Riebach, Erwin P. Rathgeb, Birger Töd...
CPAIOR
2004
Springer
15 years 10 months ago
Simple Rules for Low-Knowledge Algorithm Selection
This paper addresses the question of selecting an algorithm from a predefined set that will have the best performance on a scheduling problem instance. Our goal is to reduce the e...
J. Christopher Beck, Eugene C. Freuder
CSCLP
2004
Springer
15 years 10 months ago
A Note on Bilattices and Open Constraint Programming
Abstract. We propose to use bilattice as a constraint valuation structure in order to represent truth and belief at the same time. A bilattice is a set which owns two lattices orde...
Arnaud Lallouet