Sciweavers

5995 search results - page 997 / 1199
» Algorithmic Game Theory
Sort
View
118
Voted
DOCENG
2009
ACM
15 years 11 months ago
On the analysis of queries with counting constraints
We study the analysis problem of XPath expressions with counting constraints. Such expressions are commonly used in document transformations or programs in which they select porti...
Everardo Bárcenas, Pierre Genevès, N...
HT
2009
ACM
15 years 11 months ago
Hyperincident connected components of tagging networks
Data created by social bookmarking systems can be described as 3-partite 3-uniform hypergraphs connecting documents, users, and tags (tagging networks), such that the toolbox of c...
Nicolas Neubauer, Klaus Obermayer
ISLPED
2009
ACM
184views Hardware» more  ISLPED 2009»
15 years 11 months ago
Online work maximization under a peak temperature constraint
Increasing power densities and the high cost of low thermal resistance packages and cooling solutions make it impractical to design processors for worst-case temperature scenarios...
Thidapat Chantem, Xiaobo Sharon Hu, Robert P. Dick
MOBICOM
2009
ACM
15 years 11 months ago
Impact of mobility on spectrum sensing in cognitive radio networks
In cognitive radio networks (CRNs), spectrum sensing is key to opportunistic spectrum access while preventing any unacceptable interference to primary users’ communications. Alt...
Alexander W. Min, Kang G. Shin
RECSYS
2009
ACM
15 years 11 months ago
Collaborative prediction and ranking with non-random missing data
A fundamental aspect of rating-based recommender systems is the observation process, the process by which users choose the items they rate. Nearly all research on collaborative ď¬...
Benjamin M. Marlin, Richard S. Zemel