Sciweavers

17049 search results - page 3368 / 3410
» cans 2007
Sort
View
ATAL
2010
Springer
13 years 11 months ago
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mod...
Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintve...
FOCS
2008
IEEE
13 years 11 months ago
Minimizing Movement in Mobile Facility Location Problems
In the mobile facility location problem, which is a variant of the classical Uncapacitated Facility Location and kMedian problems, each facility and client is assigned to a start ...
Zachary Friggstad, Mohammad R. Salavatipour
GG
2008
Springer
13 years 11 months ago
Graph-Based Tools: The Contest
This event is the second instance of the contest for graph transformation-based tools, which was first held as part of the AGTIVE workshop. The aim is to stimulate tool developmen...
Arend Rensink, Pieter Van Gorp
BIBM
2007
IEEE
133views Bioinformatics» more  BIBM 2007»
13 years 10 months ago
Mining Clinical Data with a Temporal Dimension: A Case Study
Clinical databases store large amounts of information about patients and their medical conditions. Data mining techniques can extract relationships and patterns holding in this we...
Michele Berlingerio, Francesco Bonchi, Fosca Giann...
CIDM
2007
IEEE
13 years 10 months ago
SSM : A Frequent Sequential Data Stream Patterns Miner
Data stream applications like sensor network data, click stream data, have data arriving continuously at high speed rates and require online mining process capable of delivering c...
C. I. Ezeife, Mostafa Monwar
« Prev « First page 3368 / 3410 Last » Next »