Sciweavers

1512 search results - page 72 / 303
» When Suboptimal Rules
Sort
View
ATAL
2007
Springer
15 years 5 months ago
Average-case tractability of manipulation in voting via the fraction of manipulators
Recent results have established that a variety of voting rules are computationally hard to manipulate in the worst-case; this arguably provides some guarantee of resistance to man...
Ariel D. Procaccia, Jeffrey S. Rosenschein
ISIPTA
2003
IEEE
110views Mathematics» more  ISIPTA 2003»
15 years 4 months ago
Extensions of Expected Utility Theory and Some Limitations of Pairwise Comparisons
We contrast three decision rules that extend Expected Utility to contexts where a convex set of probabilities is used to depict uncertainty: Γ-Maximin, Maximality, and E-admissib...
Mark J. Schervish, Teddy Seidenfeld, Joseph B. Kad...
AINA
2010
IEEE
15 years 4 months ago
A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
— Developing and managing firewall Access Control Lists (ACLs) are hard, time-consuming, and error-prone tasks for a variety of reasons. Complexity of networks is constantly incr...
Sergio Pozo, A. J. Varela-Vaca, Rafael M. Gasca
SIGMOD
1989
ACM
118views Database» more  SIGMOD 1989»
15 years 3 months ago
The Architecture Of An Active Data Base Management System
The HiPAC project is investigating active, time-constrained databasemanagment. An active DBMS is one which automatically executes specified actions when speciifed conditions arise...
Dennis R. McCarthy, Umeshwar Dayal
GG
2008
Springer
15 years 4 days ago
Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts
Behavior preservation, namely the fact that the behavior of a model is not altered by the transformations, is a crucial property in refactoring. The most common approaches to behav...
Guilherme Rangel, Leen Lambers, Barbara König...