Sciweavers

5580 search results - page 1005 / 1116
» Randomized priority algorithms
Sort
View
ICWS
2010
IEEE
13 years 5 months ago
An Approach for Mining Web Service Composition Patterns from Execution Logs
A service-oriented application is composed of multiple web services to fulfill complex functionality that cannot be provided by individual web service. The combination of services ...
Ran Tang, Ying Zou
IWCMC
2010
ACM
13 years 5 months ago
High performance modified DSR routing protocol for WLAN mesh networks
This work presents a cross-layer modification to the DSR protocol which discovers high throughput paths on multi-hop wireless mesh networks. The modified DSR incorporates a metric...
Mustafa Ramadhan, Mark Davis
NAACL
2010
13 years 5 months ago
Minimally-Supervised Extraction of Entities from Text Advertisements
Extraction of entities from ad creatives is an important problem that can benefit many computational advertising tasks. Supervised and semi-supervised solutions rely on labeled da...
Sameer Singh, Dustin Hillard, Chris Leggetter
PIMRC
2010
IEEE
13 years 5 months ago
On the feasibility of receive collaboration in wireless sensor networks
In this paper, a new type of collaboration in wireless sensor networks (WSN) is suggested that exploits array processing algorithms for better reception of a signal. For receive co...
Behnam Banitalebi, S. Sigg, M. Beigl
WINE
2010
Springer
149views Economy» more  WINE 2010»
13 years 5 months ago
Winner-Imposing Strategyproof Mechanisms for Multiple Facility Location Games
We study Facility Location games, where a number of facilities are placed in a metric space based on locations reported by strategic agents. A mechanism maps the agents' locat...
Dimitris Fotakis, Christos Tzamos
« Prev « First page 1005 / 1116 Last » Next »