Sciweavers

1016 search results - page 141 / 204
» Explore or Exploit
Sort
View
AGENTS
2000
Springer
14 years 6 days ago
Customer coalitions in the electronic marketplace
1 In the last few years, the electronic marketplace has witnessed an exponential growth in worth and size, and projections are for this trend to intensify in coming years. Yet, th...
Maksim Tsvetovat, Katia P. Sycara
DL
2000
Springer
162views Digital Library» more  DL 2000»
14 years 6 days ago
Snowball: extracting relations from large plain-text collections
Text documents often contain valuable structured data that is hidden in regular English sentences. This data is best exploited if available as a relational table that we could use...
Eugene Agichtein, Luis Gravano
VRST
1999
ACM
14 years 5 days ago
The London Travel Demonstrator
Travel can be a stressful experience and it is an activity that is difficult to prepare for in advance. Although maps, routes and landmarks can be memorised, travellers do not get...
Anthony Steed, Emmanuel Frécon, Anneli Avat...
INFOCOM
1999
IEEE
14 years 4 days ago
Multicast-Based Inference of Network-Internal Characteristics: Accuracy of Packet Loss Estimation
Abstract--We explore the use of end-to-end multicast traffic as measurement probes to infer network-internal characteristics. We have developed in an earlier paper [2] a Maximum Li...
Ramón Cáceres, Nick G. Duffield, Jos...
HPCA
1998
IEEE
14 years 4 days ago
Supporting Highly-Speculative Execution via Adaptive Branch Trees
Most of the prediction mechanisms predict a single path to continue the execution on a branch. Alternatively, we may exploit parallelism from either possible paths of a branch, di...
Tien-Fu Chen