Sciweavers

5344 search results - page 406 / 1069
» Privacy-Preserving Set Operations
Sort
View
LICS
2009
IEEE
15 years 11 months ago
Expressiveness and Closure Properties for Quantitative Languages
Weighted automata are nondeterministic automata with numerical weights on transitions. They can define quantitative languages L that assign to each word w a real number L(w). In ...
Krishnendu Chatterjee, Laurent Doyen, Thomas A. He...
137
Voted
BPM
2009
Springer
195views Business» more  BPM 2009»
15 years 11 months ago
Process Mining: Fuzzy Clustering and Performance Visualization
The goal of performance analysis of business processes is to gain insights into operational processes, for the purpose of optimizing them. To intuitively show which parts of the pr...
Boudewijn F. van Dongen, A. Adriansyah
UC
2009
Springer
15 years 11 months ago
Computing Domains of Attraction for Planar Dynamics
In this note we investigate the problem of computing the domain of attraction of a flow on R2 for a given attractor. We consider an operator that takes two inputs, the description...
Daniel S. Graça, Ning Zhong
INFOCOM
2008
IEEE
15 years 11 months ago
Peacock Hashing: Deterministic and Updatable Hashing for High Performance Networking
—Hash tables are extensively used in networking to implement data-structures that associate a set of keys to a set of values, as they provide O(1), query, insert and delete opera...
Sailesh Kumar, Jonathan S. Turner, Patrick Crowley
GECCO
2007
Springer
179views Optimization» more  GECCO 2007»
15 years 11 months ago
A destructive evolutionary process: a pilot implementation
This paper describes the application of evolutionary search to the problem of Flash memory wear-out. The operating parameters of Flash memory are notoriously difficult to determin...
Joe Sullivan, Conor Ryan