Sciweavers

IJCAI
1989
13 years 5 months ago
Experiences Implementing a Parallel ATMS on a Shared-Memory Multiprocessor
The Assumption-Based Truth Maintenance System (ATMS) is an important tool in A I . So far its wider use has been limited due to the enormous computational resources which it requi...
Edward Rothberg, Anoop Gupta
UAI
1997
13 years 5 months ago
Structure and Parameter Learning for Causal Independence and Causal Interaction Models
We begin by discussing causal independence models and generalize these models to causal interaction models. Causal interaction models are models that have independent mechanisms w...
Christopher Meek, David Heckerman
IJCAI
1997
13 years 5 months ago
Cooperation Structures
In order to cooperate effectively with its peers, an agent must manipulate representations of the social structures in which it plays a part. The purpose of this paper is to inves...
Mark d'Inverno, Michael Luck, Michael Wooldridge
SODA
2003
ACM
116views Algorithms» more  SODA 2003»
13 years 6 months ago
Browsing around a digital library
What will it be like to work in the digital library of the future? We begin by browsing around an experimental digital library of the present, glancing at some collections and show...
Ian H. Witten
AAAI
2007
13 years 6 months ago
Valuation Uncertainty and Imperfect Introspection in Second-Price Auctions
In auction theory, agents are typically presumed to have perfect knowledge of their valuations. In practice, though, they may face barriers to this knowledge due to transaction co...
David Robert Martin Thompson, Kevin Leyton-Brown
MSS
1995
IEEE
94views Hardware» more  MSS 1995»
13 years 8 months ago
Storage Systems for Movies-on-Demand Video Servers
ct In this paper, we evaluate storage system alternatives for movies-on-demandvideo servers. We begin by characterizing the movies-on-demand workload. We brie y discuss performance...
Ann L. Chervenak, David A. Patterson, Randy H. Kat...
WMP
2000
13 years 8 months ago
Mathematics of Multisets
This paper is an attempt to summarize the basic elements of the multiset theory. We begin by describing multisets and the operations between them, then we present hybrid sets and t...
Apostolos Syropoulos
GFKL
2006
Springer
108views Data Mining» more  GFKL 2006»
13 years 8 months ago
Identifying and Exploiting Ultrametricity
We begin with pervasive ultrametricity due to high dimensionality and/or spatial sparsity. How extent or degree of ultrametricity can be quantified leads us to the discussion of va...
Fionn Murtagh
CIKM
2006
Springer
13 years 8 months ago
Structure-based querying of proteins using wavelets
The ability to retrieve molecules based on structural similarity has use in many applications, from disease diagnosis and treatment to drug discovery and design. In this paper, we...
Keith Marsolo, Srinivasan Parthasarathy, Kotagiri ...
CSE
2009
IEEE
13 years 8 months ago
A Unified Approach to Intra-domain Security
While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to sec...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta