Sciweavers

1093 search results - page 118 / 219
» Clustering from Constraint Graphs
Sort
View
132
Voted
COGSCI
2010
107views more  COGSCI 2010»
15 years 3 months ago
Inferring Hidden Causal Structure
We used a new method to assess how people can infer unobserved causal structure from patterns of observed events. Participants were taught to draw causal graphs, and then shown a ...
Tamar Kushnir, Alison Gopnik, Chris Lucas, Laura S...
118
Voted
ENTCS
2007
108views more  ENTCS 2007»
15 years 3 months ago
Termination Criteria for DPO Transformations with Injective Matches
Reasoning about graph and model transformation systems is an important means to underpin model-driven software engineering, such as Model-Driven Architecture (MDA) and Model Integ...
Tihamer Levendovszky, Ulrike Prange, Hartmut Ehrig
115
Voted
SIAMDM
2010
117views more  SIAMDM 2010»
15 years 2 months ago
Design is as Easy as Optimization
We consider the class of max-min and min-max optimization problems subject to a global budget (or weight) constraint and we undertake a systematic algorithmic and complexitytheore...
Deeparnab Chakrabarty, Aranyak Mehta, Vijay V. Vaz...
BMCBI
2007
162views more  BMCBI 2007»
15 years 3 months ago
Three-Dimensional Phylogeny Explorer: Distinguishing paralogs, lateral transfer, and violation of "molecular clock" assumption w
Background: Construction and interpretation of phylogenetic trees has been a major research topic for understanding the evolution of genes. Increases in sequence data and complexi...
Namshin Kim, Christopher Lee
134
Voted
JSAC
2007
97views more  JSAC 2007»
15 years 3 months ago
R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming
— In information theory, it has been shown that network coding can effectively improve the throughput of multicast communication sessions in directed acyclic graphs. More practic...
Mea Wang, Baochun Li