Sciweavers

65 search results - page 12 / 13
» The Accuracy of Search Heuristics: An Empirical Study on Kna...
Sort
View
WOSP
2005
ACM
13 years 12 months ago
A capacity management service for resource pools
Resource pools are computing environments that offer virtualized access to shared resources. When used effectively they can align the use of capacity with business needs (flexi...
Jerry Rolia, Ludmila Cherkasova, Martin F. Arlitt,...
WSDM
2012
ACM
296views Data Mining» more  WSDM 2012»
12 years 1 months ago
Inferring social ties across heterogenous networks
It is well known that different types of social ties have essentially different influence between people. However, users in online social networks rarely categorize their contact...
Jie Tang, Tiancheng Lou, Jon M. Kleinberg
GECCO
2007
Springer
173views Optimization» more  GECCO 2007»
14 years 14 days ago
UCSpv: principled voting in UCS rule populations
Credit assignment is a fundamental issue for the Learning Classifier Systems literature. We engage in a detailed investigation of credit assignment in one recent system called UC...
Gavin Brown, Tim Kovacs, James A. R. Marshall
CIKM
2009
Springer
14 years 27 days ago
Fast shortest path distance estimation in large networks
In this paper we study approximate landmark-based methods for point-to-point distance estimation in very large networks. These methods involve selecting a subset of nodes as landm...
Michalis Potamias, Francesco Bonchi, Carlos Castil...
DSS
2007
226views more  DSS 2007»
13 years 6 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri