Sciweavers

1760 search results - page 212 / 352
» Connected Set Cover Problem and Its Applications
Sort
View
GCC
2007
Springer
14 years 2 months ago
Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks
Many Internet applications use overlay networks as their basic facilities, like resource sharing, collaborative computing, and so on. Considering the communication cost, most over...
Zhenhua Li, Guihai Chen
HICSS
2003
IEEE
124views Biometrics» more  HICSS 2003»
14 years 1 months ago
A Framework for Strategic Balancing of Knowledge Management Initiatives
Enterprises need to understand the impact of different types of knowledge management (KM) approaches on business strategy, and how they interact with other types of initiatives to...
Jan Aidemark, Håkan Sterner
HASE
1997
IEEE
14 years 6 days ago
ReSoFT: A Reusable Testbed for Development and Evaluation of Software Fault-Tolerant Systems
The Reusable Software Fault Tolerance Testbed ReSoFT was developed to facilitate the development and evaluation of high-assurance systems that require tolerance of both hardware...
Kam S. Tso, Eltefaat Shokri, Roger J. Dziegiel Jr.
SODA
2008
ACM
144views Algorithms» more  SODA 2008»
13 years 9 months ago
Fast dimension reduction using Rademacher series on dual BCH codes
The Fast Johnson-Lindenstrauss Transform (FJLT) was recently discovered by Ailon and Chazelle as a novel technique for performing fast dimension reduction with small distortion fr...
Nir Ailon, Edo Liberty
IEAAIE
2010
Springer
13 years 6 months ago
Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation
The ability for a user to accurately estimate the amount of trust to be placed in a peer user is gaining more and more attention in social network applications. Trust aggregation p...
Nele Verbiest, Chris Cornelis, Patricia Victor, En...