Sciweavers

5995 search results - page 1001 / 1199
» Algorithmic Game Theory
Sort
View
IDEAS
2008
IEEE
105views Database» more  IDEAS 2008»
15 years 11 months ago
Pruning attribute values from data cubes with diamond dicing
Data stored in a data warehouse are inherently multidimensional, but most data-pruning techniques (such as iceberg and top-k queries) are unidimensional. However, analysts need to...
Hazel Webb, Owen Kaser, Daniel Lemire
INFOCOM
2008
IEEE
15 years 11 months ago
Maximizing Resilient Throughput in Peer-to-Peer Network: A Generalized Flow Approach
—A unique challenge in P2P network is that the peer dynamics (departure or failure) cause unavoidable disruption to the downstream peers. While many works have been dedicated to ...
Bin Chang, Yi Cui, Yuan Xue
IPPS
2008
IEEE
15 years 11 months ago
On performance bottleneck of anonymous communication networks
Although a significant amount of effort has been directed at discovering attacks against anonymity communication networks and developing countermeasures to those attacks, there i...
Ryan Pries, Wei Yu, Steve Graham, Xinwen Fu
147
Voted
IROS
2008
IEEE
125views Robotics» more  IROS 2008»
15 years 11 months ago
Dynamic correlation matrix based multi-Q learning for a multi-robot system
—Multi-robot reinforcement learning is a very challenging area due to several issues, such as large state spaces, difficulty in reward assignment, nondeterministic action selecti...
Hongliang Guo, Yan Meng
RTAS
2008
IEEE
15 years 11 months ago
A Modular Worst-case Execution Time Analysis Tool for Java Processors
Recent technologies such as the Real-Time Specification for Java promise to bring Java’s advantages to real-time systems. While these technologies have made Java more predictab...
Trevor Harmon, Martin Schoeberl, Raimund Kirner, R...
« Prev « First page 1001 / 1199 Last » Next »