Sciweavers

4544 search results - page 855 / 909
» Reinforcement Learning with Time
Sort
View
FUN
2010
Springer
230views Algorithms» more  FUN 2010»
15 years 5 months ago
Scheduling with Bully Selfish Jobs
In job scheduling with precedence constraints, i j means that job j cannot start being processed before job i is completed. In this paper we consider selfish bully jobs who do no...
Tami Tamir
ACMSE
2008
ACM
15 years 4 months ago
Optimization of the multiple retailer supply chain management problem
With stock surpluses and shortages representing one of the greatest elements of risk to wholesalers, a solution to the multiretailer supply chain management problem would result i...
Caio Soares, Gerry V. Dozier, Emmett Lodree, Jared...
CCS
2008
ACM
15 years 4 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
MMM
2010
Springer
141views Multimedia» more  MMM 2010»
15 years 4 months ago
Slow Intelligence Systems
: Networks and distributed computing systems are becoming increasingly important and at the same time, more and more critical to the world of Information Technology. This rash spre...
Shi-Kuo Chang
ESWS
2008
Springer
15 years 3 months ago
OntoGame: Weaving the Semantic Web by Online Games
Most of the challenges faced when building the Semantic Web require a substantial amount of human labor and intelligence. Despite significant advancement in ontology learning and h...
Katharina Siorpaes, Martin Hepp