Sciweavers

6245 search results - page 1189 / 1249
» A Case for Aggregate Networks
Sort
View
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
15 years 6 months ago
Metric forensics: a multi-level approach for mining volatile graphs
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...
PERVASIVE
2010
Springer
15 years 6 months ago
Supporting Energy-Efficient Uploading Strategies for Continuous Sensing Applications on Mobile Phones
Abstract. Continuous sensing applications (e.g., mobile social networking applications) are appearing on new sensor-enabled mobile phones such as the Apple iPhone, Nokia and Androi...
Mirco Musolesi, Mattia Piraccini, Kristof Fodor, A...
NSDI
2010
15 years 5 months ago
Mugshot: Deterministic Capture and Replay for JavaScript Applications
Mugshot is a system that captures every event in an executing JavaScript program, allowing developers to deterministically replay past executions of web applications. Replay is us...
James Mickens, Jeremy Elson, Jon Howell
SODA
2008
ACM
108views Algorithms» more  SODA 2008»
15 years 5 months ago
Price based protocols for fair resource allocation: convergence time analysis and extension to Leontief utilities
We analyze several distributed, continuous time protocols for a fair allocation of bandwidths to flows in a network (or resources to agents). Our protocols converge to an allocati...
Ashish Goel, Hamid Nazerzadeh
ESANN
2004
15 years 5 months ago
Sparse LS-SVMs using additive regularization with a penalized validation criterion
This paper is based on a new way for determining the regularization trade-off in least squares support vector machines (LS-SVMs) via a mechanism of additive regularization which ha...
Kristiaan Pelckmans, Johan A. K. Suykens, Bart De ...
« Prev « First page 1189 / 1249 Last » Next »