Sciweavers

1687 search results - page 277 / 338
» Which pointer analysis should I use
Sort
View
135
Voted
WCE
2007
15 years 4 months ago
Power Flow Modelling of a Self-excited Induction Generator
—This paper presents power flow models of a self-excited induction generator. These models are used for steady-state power flow calculation in electric power systems in which a g...
Thanatchai Kulworawanichpong, P. Sangsarawut
111
Voted
ATAL
2010
Springer
15 years 3 months ago
Changing neighbours: improving tag-based cooperation
In systems of autonomous self-interested agents, in which agents' neighbourhoods are defined by their connections to others, cooperation can arise through observation of the ...
Nathan Griffiths, Michael Luck
131
Voted
ATAL
2010
Springer
15 years 3 months ago
Honor among thieves: collusion in multi-unit auctions
We consider collusion in multi-unit auctions where the allocation and payments are determined using the VCG mechanism. We show how collusion can increase the utility of the collud...
Yoram Bachrach
132
Voted
HUC
2010
Springer
15 years 3 months ago
Bridging the gap between physical location and online social networks
This paper examines the location traces of 489 users of a location sharing social network for relationships between the users' mobility patterns and structural properties of ...
Justin Cranshaw, Eran Toch, Jason I. Hong, Aniket ...
93
Voted
COR
2010
124views more  COR 2010»
15 years 2 months ago
On tandem blocking queues with a common retrial queue
We consider systems of tandem blocking queues having a common retrial queue. The model represents dynamics of short TCP transfers in the Internet. Analytical results are available...
Konstantin Avrachenkov, Uri Yechiali