Sciweavers

1396 search results - page 202 / 280
» aim 2006
Sort
View
CCS
2006
ACM
15 years 1 months ago
Secure information flow with random assignment and encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables classified as H to variables classified as L. In this work we extend such...
Geoffrey Smith
CIA
2006
Springer
15 years 1 months ago
Multilevel Approach to Agent-Based Task Allocation in Transportation
We present a hybrid algorithm for distributed task allocation problem in a cooperative logistics domain. Our approach aims to achieve superior computational performance by combinin...
Martin Rehák, Premysl Volf, Michal Pechouce...
COLT
2006
Springer
15 years 1 months ago
A Sober Look at Clustering Stability
Stability is a common tool to verify the validity of sample based algorithms. In clustering it is widely used to tune the parameters of the algorithm, such as the number k of clust...
Shai Ben-David, Ulrike von Luxburg, Dávid P...
COLT
2006
Springer
15 years 1 months ago
Learning Rational Stochastic Languages
Given a finite set of words w1, . . . , wn independently drawn according to a fixed unknown distribution law P called a stochastic language, an usual goal in Grammatical Inference ...
François Denis, Yann Esposito, Amaury Habra...
CP
2006
Springer
15 years 1 months ago
Distributed Constraint-Based Local Search
Distributed computing is increasingly important at a time when the doubling of the number of transistors on a processor every 18 months no longer translates in a doubling of speed ...
Laurent Michel, Andrew See, Pascal Van Hentenryck