Sciweavers

16091 search results - page 3023 / 3219
» Solving
Sort
View
ECLIPSE
2005
ACM
15 years 6 months ago
Coping with an open bug repository
Most open source software development projects include an open bug repository—one to which users of the software can gain full access—that is used to report and track problems...
John Anvik, Lyndon Hiew, Gail C. Murphy
ASIACRYPT
2008
Springer
15 years 6 months ago
MPC vs. SFE : Unconditional and Computational Security
Abstract. In secure computation among a set P of players one considers an adversary who can corrupt certain players. The three usually considered types of corruption are active, pa...
Martin Hirt, Ueli M. Maurer, Vassilis Zikas
137
Voted
COMPSAC
2007
IEEE
15 years 6 months ago
Towards End User Service Composition
The popularity of Service Oriented Computing (SOC) brings a large number of distributed, well-encapsulated and reusable services all over internet, and makes it possible to create...
Xuanzhe Liu, Gang Huang, Hong Mei
RECOMB
2010
Springer
15 years 6 months ago
Leveraging Sequence Classification by Taxonomy-Based Multitask Learning
In this work we consider an inference task that biologists are very good at: deciphering biological processes by bringing together knowledge that has been obtained by experiments u...
Christian Widmer, Jose Leiva, Yasemin Altun, Gunna...
CP
2008
Springer
15 years 6 months ago
Elicitation Strategies for Fuzzy Constraint Problems with Missing Preferences: Algorithms and Experimental Studies
Fuzzy constraints are a popular approach to handle preferences and over-constrained problems in scenarios where one needs to be cautious, such as in medical or space applications. ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
« Prev « First page 3023 / 3219 Last » Next »