Sciweavers

5056 search results - page 983 / 1012
» Network Coding Theory
Sort
View
ICWSM
2010
13 years 11 months ago
Who Acquires Friends Through Social Media and Why? "Rich Get Richer" Versus "Seek and Ye Shall Find"
There is an ongoing debate, not just among academics but in popular culture, about whether social media can expand people's social networks, and whether online friends can be...
Zeynep Tufekci
DGO
2007
121views Education» more  DGO 2007»
13 years 11 months ago
Social capital and ICT adoption in the public sector
Although the research domain on social capital and the adoption of Information and Communication Technologies (ICTs) is relatively immature, there is a fast growing body of eviden...
Noor Huijboom
ESANN
2008
13 years 11 months ago
Learning to play Tetris applying reinforcement learning methods
In this paper the application of reinforcement learning to Tetris is investigated, particulary the idea of temporal difference learning is applied to estimate the state value funct...
Alexander Groß, Jan Friedland, Friedhelm Sch...
SIMUTOOLS
2008
13 years 11 months ago
Simulating SMEPP middleware
Embedded Peer-to-Peer Systems (EP2P) represent a new challenge in the development of software for distributed systems. The main objective of the SMEPP (Secure Middleware for Embed...
Javier Barbarán, Carlos Bonilla, Jose &Aacu...
SDM
2007
SIAM
131views Data Mining» more  SDM 2007»
13 years 11 months ago
Load Shedding in Classifying Multi-Source Streaming Data: A Bayes Risk Approach
In many applications, we monitor data obtained from multiple streaming sources for collective decision making. The task presents several challenges. First, data in sensor networks...
Yijian Bai, Haixun Wang, Carlo Zaniolo