Sciweavers

445 search results - page 81 / 89
» Recco: recombination analysis using cost optimization
Sort
View
EMS
2008
IEEE
15 years 5 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
135
Voted
AAAI
2010
15 years 5 months ago
Decision-Theoretic Control of Crowd-Sourced Workflows
Crowd-sourcing is a recent framework in which human intelligence tasks are outsourced to a crowd of unknown people ("workers") as an open call (e.g., on Amazon's Me...
Peng Dai, Mausam, Daniel S. Weld
DATAMINE
2010
175views more  DATAMINE 2010»
15 years 3 months ago
Extracting influential nodes on a social network for information diffusion
We address the combinatorial optimization problem of finding the most influential nodes on a large-scale social network for two widely-used fundamental stochastic diffusion models...
Masahiro Kimura, Kazumi Saito, Ryohei Nakano, Hiro...
136
Voted
JUCS
2006
128views more  JUCS 2006»
15 years 3 months ago
A Web-Based Decision Support System for Chronic Diseases
: Individuals vary in survival chances due to differences in genetics, environmental exposures, and gene-environment interactions. These chances, as well as the contribution of eac...
Chi-Chan Chang, Chuen-Sheng Cheng, Yeu-Shiang Huan...
JSAC
2007
104views more  JSAC 2007»
15 years 3 months ago
Price dynamics in competitive agile spectrum access markets
— We explore the price dynamics in a competitive market consisting of spectrum agile network service providers and users. Here, multiple self interested spectrum providers operat...
Yiping Xing, Rajarathnam Chandramouli, Carlos de M...