Sciweavers

5639 search results - page 494 / 1128
» Timed Abstract Non-interference
Sort
View
ADMI
2009
Springer
15 years 11 months ago
A Sequence Mining Method to Predict the Bidding Strategy of Trading Agents
Abstract. In this work, we describe the process used in order to predict the bidding strategy of trading agents. This was done in the context of the Reverse TAC, or CAT, game of th...
Vivia Nikolaidou, Pericles A. Mitkas
ALDT
2009
Springer
186views Algorithms» more  ALDT 2009»
15 years 11 months ago
The Complexity of Probabilistic Lobbying
Abstract. We propose various models for lobbying in a probabilistic environment, in which an actor (called “The Lobby”) seeks to influence the voters’ preferences of voting ...
Gábor Erdélyi, Henning Fernau, Judy ...
BPM
2009
Springer
140views Business» more  BPM 2009»
15 years 11 months ago
Mobile Workforce Scheduling Problem with Multitask-Processes
Abstract. In this work we introduce a new generalization of the ResourceConstrained Project Scheduling Problem – the Mobile Workforce Scheduling Problem with Multitask-Processes ...
Asvin Goel, Volker Gruhn, Thomas Richter
WIA
2009
Springer
15 years 11 months ago
Implementation of State Elimination Using Heuristics
Abstract. State elimination is an intuitive and easy-to-implement algorithm that computes a regular expression from a finite-state automaton (FA). The size of a regular expression...
Jae-Hee Ahn, Yo-Sub Han
CSR
2009
Springer
15 years 11 months ago
A Feebly Secure Trapdoor Function
Abstract. In 1992, A. Hiltgen [1] provided the first constructions of provably (slightly) secure cryptographic primitives, namely feebly one-way functions. These functions are pro...
Edward A. Hirsch, Sergey I. Nikolenko