Sciweavers

811 search results - page 50 / 163
» When Novelty Is Not Enough
Sort
View
DMIN
2007
161views Data Mining» more  DMIN 2007»
13 years 10 months ago
Efficient Summarization Based On Categorized Keywords
—The information that exists on the World Wide Web is enormous enough in order to distract the users when trying to find useful information. In order to overcome the large amount...
Christos Bouras, Vassilis Poulopoulos, Vassilis Ts...
SIGMETRICS
2008
ACM
13 years 8 months ago
Path-quality monitoring in the presence of adversaries
Edge networks connected to the Internet need effective monitoring techniques to drive routing decisions and detect violations of Service Level Agreements (SLAs). However, existing...
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Bar...
EOR
2010
99views more  EOR 2010»
13 years 7 months ago
Repeated newsvendor game with transshipments under dual allocations
We study a repeated newsvendor game with transshipments. In every period n retailers face a stochastic demand for an identical product and independently place their inventory orde...
Xiao Huang, Greys Sosic
IOR
2008
113views more  IOR 2008»
13 years 7 months ago
Finding Supply Function Equilibria with Asymmetric Firms
Abstract Firms compete in supply functions when they offer a schedule of prices and quantities into a market; for example, this occurs in many wholesale electricity markets. We stu...
Edward J. Anderson, Xinmin Hu
SOUPS
2005
ACM
14 years 2 months ago
Stopping spyware at the gate: a user study of privacy, notice and spyware
Spyware is a significant problem for most computer users. The term “spyware” loosely describes a new class of computer software. This type of software may track user activitie...
Nathaniel Good, Rachna Dhamija, Jens Grossklags, D...