Sciweavers

3717 search results - page 675 / 744
» Representing Multiple Theories
Sort
View
ATAL
2010
Springer
13 years 11 months ago
Worst-case efficiency ratio in false-name-proof combinatorial auction mechanisms
This paper analyzes the worst-case efficiency ratio of falsename-proof combinatorial auction mechanisms. False-nameproofness generalizes strategy-proofness by assuming that a bidd...
Atsushi Iwasaki, Vincent Conitzer, Yoshifusa Omori...
ECRTS
2010
IEEE
13 years 11 months ago
Making DRAM Refresh Predictable
Embedded control systems with hard real-time constraints require that deadlines are met at all times or the system may malfunction with potentially catastrophic consequences. Sched...
Balasubramanya Bhat, Frank Mueller
ICDE
2010
IEEE
178views Database» more  ICDE 2010»
13 years 10 months ago
Autonomic workload execution control using throttling
— Database Management Systems (DBMSs) are often required to simultaneously process multiple diverse workloads while enforcing business policies that govern workload performance. ...
Wendy Powley, Patrick Martin, Mingyi Zhang, Paul B...
ALMOB
2007
170views more  ALMOB 2007»
13 years 10 months ago
A spatio-temporal mining approach towards summarizing and analyzing protein folding trajectories
Understanding the protein folding mechanism remains a grand challenge in structural biology. In the past several years, computational theories in molecular dynamics have been empl...
Hui Yang, Srinivasan Parthasarathy, Duygu Ucar
BMCBI
2007
159views more  BMCBI 2007»
13 years 10 months ago
Detecting differential expression in microarray data: comparison of optimal procedures
Background: Many procedures for finding differentially expressed genes in microarray data are based on classical or modified t-statistics. Due to multiple testing considerations, ...
Elena Perelman, Alexander Ploner, Stefano Calza, Y...