Sciweavers

10907 search results - page 2116 / 2182
» Constraint Based Strategies
Sort
View
ESA
2009
Springer
122views Algorithms» more  ESA 2009»
15 years 10 months ago
Bounded Budget Betweenness Centrality Game for Strategic Network Formations
In this paper, we introduce the bounded budget betweenness centrality game, a strategic network formation game in which nodes build connections subject to a budget constraint in or...
Xiaohui Bei, Wei Chen, Shang-Hua Teng, Jialin Zhan...
PKDD
2009
Springer
134views Data Mining» more  PKDD 2009»
15 years 10 months ago
Mining Graph Evolution Rules
In this paper we introduce graph-evolution rules, a novel type of frequency-based pattern that describe the evolution of large networks over time, at a local level. Given a sequenc...
Michele Berlingerio, Francesco Bonchi, Björn ...
PRIB
2009
Springer
120views Bioinformatics» more  PRIB 2009»
15 years 10 months ago
Knowledge-Guided Docking of WW Domain Proteins and Flexible Ligands
Studies of interactions between protein domains and ligands are important in many aspects such as cellular signaling. We present a knowledge-guided approach for docking protein dom...
Haiyun Lu, Hao Li, Shamima Banu Bte Sm Rashid, Wee...
137
Voted
ISLPED
2009
ACM
178views Hardware» more  ISLPED 2009»
15 years 10 months ago
Power management in energy harvesting embedded systems with discrete service levels
Power management has been a critical issue in the design of embedded systems due to the limited power supply. To prolong the lifetime, energy minimization has been studied under p...
Clemens Moser, Jian-Jia Chen, Lothar Thiele
SACMAT
2009
ACM
15 years 10 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
« Prev « First page 2116 / 2182 Last » Next »