Sciweavers

3946 search results - page 759 / 790
» The computational complexity of choice sets
Sort
View
CODASPY
2011
14 years 8 months ago
Privacy-preserving activity scheduling on mobile devices
—Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users’ personal schedules. Users also access popular contextbase...
Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hu...
159
Voted
IPSN
2011
Springer
14 years 8 months ago
Exploration of path space using sensor network geometry
In a sensor network there are many paths between a source and a destination. An efficient method to explore and navigate in the ‘path space’ can help many important routing p...
Ruirui Jiang, Xiaomeng Ban, Mayank Goswami, Wei Ze...
177
Voted
CASES
2011
ACM
14 years 4 months ago
Cost-effective safety and fault localization using distributed temporal redundancy
Cost pressure is driving vendors of safety-critical systems to integrate previously distributed systems. One natural approach we have previous introduced is On-Demand Redundancy (...
Brett H. Meyer, Benton H. Calhoun, John Lach, Kevi...
181
Voted
CORR
2012
Springer
170views Education» more  CORR 2012»
14 years 10 days ago
What Cannot be Learned with Bethe Approximations
We address the problem of learning the parameters in graphical models when inference is intractable. A common strategy in this case is to replace the partition function with its B...
Uri Heinemann, Amir Globerson
156
Voted
TSE
2012
13 years 7 months ago
Does Software Process Improvement Reduce the Severity of Defects? A Longitudinal Field Study
— As firms increasingly rely on information systems to perform critical functions the consequences of software defects can be catastrophic. Although the software engineering lite...
Donald E. Harter, Chris F. Kemerer, Sandra Slaught...