Sciweavers

1056 search results - page 50 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
ICC
2007
IEEE
137views Communications» more  ICC 2007»
14 years 2 months ago
Optimality and Complexity of Opportunistic Spectrum Access: A Truncated Markov Decision Process Formulation
— We consider opportunistic spectrum access (OSA) which allows secondary users to identify and exploit instantaneous spectrum opportunities resulting from the bursty traffic of ...
Dejan V. Djonin, Qing Zhao, Vikram Krishnamurthy
ATVA
2007
Springer
90views Hardware» more  ATVA 2007»
13 years 11 months ago
Efficient Approximate Verification of Promela Models Via Symmetry Markers
We present a new verification technique for Promela which exploits state-space symmetries induced by scalarset values used in a model. The technique involves efficiently computing ...
Dragan Bosnacki, Alastair F. Donaldson, Michael Le...
AAAI
2007
13 years 10 months ago
Cautious Inference in Collective Classification
Collective classification can significantly improve accuracy by exploiting relationships among instances. Although several collective inference procedures have been reported, they...
Luke McDowell, Kalyan Moy Gupta, David W. Aha
VDB
1998
275views Database» more  VDB 1998»
13 years 9 months ago
Building Metaphors for Supporting User Interaction with Multimedia Databases
In this paper we discuss how metaphors for supporting user interaction with multimedia databases can be automatically generated. The work presented is a further step in the develo...
Maria Francesca Costabile, Donato Malerba, Matthia...
ECWEB
2010
Springer
219views ECommerce» more  ECWEB 2010»
13 years 8 months ago
Semantic Tag Cloud Generation via DBpedia
Abstract. Many current recommender systems exploit textual annotations (tags) provided by users to retrieve and suggest online contents. The text-based recommendation provided by t...
Roberto Mirizzi, Azzurra Ragone, Tommaso Di Noia, ...