Sciweavers

5344 search results - page 441 / 1069
» Privacy-Preserving Set Operations
Sort
View
LCTRTS
2004
Springer
15 years 10 months ago
Dynamic voltage scaling for real-time multi-task scheduling using buffers
This paper proposes energy efficient real-time multi-task scheduling (EDF and RM) algorithms by using buffers. The buffering technique overcomes a drawback of previous approaches ...
Chaeseok Im, Soonhoi Ha
MMAS
2004
Springer
15 years 10 months ago
Quantitative Organizational Models for Large-Scale Agent Systems
Abstract. As the scale and scope of multi-agent systems grow, it becomes increasingly important to design and manage the manner in which the participants interact. The potential fo...
Bryan Horling, Victor R. Lesser
159
Voted
SIGADA
2004
Springer
15 years 10 months ago
Comparative analysis of genetic algorithm implementations
Genetic Algorithms provide computational procedures that are modeled on natural genetic system mechanics, whereby a coded solution is “evolved” from a set of potential solutio...
Robert Soricone, Melvin Neville
WAIM
2004
Springer
15 years 10 months ago
Estimating the Selectivity of XML Path Expression with Predicates by Histograms
Selectivity estimation of path expressions in querying XML data plays an important role in query optimization. A path expression may contain multiple branches with predicates, each...
Yu Wang, Haixun Wang, Xiaofeng Meng, Shan Wang
HICSS
2003
IEEE
184views Biometrics» more  HICSS 2003»
15 years 10 months ago
Content Based File Type Detection Algorithms
Identifying the true type of a computer file can be a difficult problem. Previous methods of file type recognition include fixed file extensions, fixed “magic numbers” stored ...
Mason McDaniel, Mohammad Hossain Heydari