Sciweavers

1687 search results - page 279 / 338
» Which pointer analysis should I use
Sort
View
TSP
2010
13 years 4 months ago
Power allocation in orthogonal wireless relay networks with partial channel state information
Wireless amplify-and-forward relay networks in which the source communicates with the relays and destination in the first phase and the relays forward signals to the destination in...
Tung T. Pham, Ha H. Nguyen, Hoang Duong Tuan
SIGIR
2012
ACM
12 years 16 days ago
Inferring missing relevance judgments from crowd workers via probabilistic matrix factorization
In crowdsourced relevance judging, each crowd worker typically judges only a small number of examples, yielding a sparse and imbalanced set of judgments in which relatively few wo...
Hyun Joon Jung, Matthew Lease
PEWASUN
2005
ACM
14 years 3 months ago
An error model for inter-vehicle communications in highway scenarios at 5.9GHz
The design and evaluation of Inter-Vehicle Communication (IVC) protocols rely much on the accurate and efficient computational simulations. For simulations of Medium Access Contro...
Yunpeng Zang, Lothar Stibor, Georgios Orfanos, Shu...
GECCO
2006
Springer
181views Optimization» more  GECCO 2006»
14 years 1 months ago
Robustness in cooperative coevolution
Though recent analysis of traditional cooperative coevolutionary algorithms (CCEAs) casts doubt on their suitability for static optimization tasks, our experience is that the algo...
R. Paul Wiegand, Mitchell A. Potter
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
13 years 1 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...