Sciweavers

296 search results - page 45 / 60
» Empirical Evaluation of Distributed Mutual Exclusion Algorit...
Sort
View
ARGMAS
2006
Springer
13 years 11 months ago
Negotiating Using Rewards
In situations where self-interested agents interact repeatedly, it is important that they are endowed with negotiation techniques that enable them to reach agreements that are pro...
Sarvapali D. Ramchurn, Carles Sierra, Lluis Godo, ...
ATAL
2010
Springer
13 years 5 months ago
Occlusion-aware multi-UAV surveillance
We present an agent-based coordination and planning method for aerial surveillance of multiple urban areas using a group of fixed-wing unmanned aerial vehicles (UAVs). The method ...
Eduard Semsch, Michal Jakob, Dusan Pavlícek...
KDD
2009
ACM
191views Data Mining» more  KDD 2009»
14 years 8 months ago
Efficient methods for topic model inference on streaming document collections
Topic models provide a powerful tool for analyzing large text collections by representing high dimensional data in a low dimensional subspace. Fitting a topic model given a set of...
Limin Yao, David M. Mimno, Andrew McCallum
JSSPP
2009
Springer
14 years 2 months ago
Limits of Work-Stealing Scheduling
The number of applications with many parallel cooperating processes is steadily increasing, and developing efficient runtimes for their execution is an important task. Several fram...
Zeljko Vrba, Håvard Espeland, Pål Halv...
PKDD
2009
Springer
175views Data Mining» more  PKDD 2009»
14 years 2 months ago
Latent Dirichlet Bayesian Co-Clustering
Co-clustering has emerged as an important technique for mining contingency data matrices. However, almost all existing coclustering algorithms are hard partitioning, assigning each...
Pu Wang, Carlotta Domeniconi, Kathryn B. Laskey