Sciweavers

628 search results - page 122 / 126
» Scheduling Algorithm with Potential Behaviors
Sort
View
SODA
2012
ACM
177views Algorithms» more  SODA 2012»
11 years 10 months ago
Stochastic coalescence in logarithmic time
The following distributed coalescence protocol was introduced by Dahlia Malkhi in 2006 motivated by applications in social networking. Initially there are n agents wishing to coal...
Po-Shen Loh, Eyal Lubetzky
WWW
2009
ACM
14 years 2 months ago
Building term suggestion relational graphs from collective intelligence
This paper proposes an effective approach to provide relevant search terms for conceptual Web search. ‘Semantic Term Suggestion’ function has been included so that users can f...
Jyh-Ren Shieh, Yung-Huan Hsieh, Yang-Ting Yeh, Tse...
SIGIR
2009
ACM
14 years 2 months ago
Detecting spammers and content promoters in online video social networks
A number of online video social networks, out of which YouTube is the most popular, provides features that allow users to post a video as a response to a discussion topic. These f...
Fabrício Benevenuto, Tiago Rodrigues, Virg&...
ICC
2008
IEEE
105views Communications» more  ICC 2008»
14 years 2 months ago
Inter-Cell Interference Management in WiMAX Downlinks by A Stackelberg Game between BSs
We develop a game theoretic framework for effective and adaptive inter-cell interference management in the OFDMA-based WiMAX/3GPP-LTE systems. Such approach requires no fixed spe...
Yingda Chen, Koon Hoo Teo, Shalinee Kishore, Jinyu...
IISWC
2006
IEEE
14 years 1 months ago
Characterization of Error-Tolerant Applications when Protecting Control Data
Soft errors have become a significant concern and recent studies have measured the “architectural vulnerability factor” of systems to such errors, or conversely, the potentia...
Darshan D. Thaker, Diana Franklin, John Oliver, Su...