Sciweavers

18306 search results - page 3240 / 3662
» Algorithmics in Exponential Time
Sort
View
ECAI
2010
Springer
15 years 5 months ago
Bayesian Monte Carlo for the Global Optimization of Expensive Functions
In the last decades enormous advances have been made possible for modelling complex (physical) systems by mathematical equations and computer algorithms. To deal with very long run...
Perry Groot, Adriana Birlutiu, Tom Heskes
CLEF
2009
Springer
15 years 5 months ago
Interactive Probabilistic Search for GikiCLEF
In this paper we will briefly describe the approaches taken by the Berkeley Cheshire Group for the GikiCLEF task of the QA track. Because the task was intended to model some aspec...
Ray R. Larson
COMAD
2009
15 years 5 months ago
Vector-based Ranking Techniques for Identifying the Topical Anchors of a Context
Terms in textual documents tend to occur more in contexts to which they are related. We can exploit this bias by modelling terms and their cooccurrences s, resembling the abstract...
Aditya Ramana Rachakonda, Srinath Srinivasa
ETM
2010
257views Economy» more  ETM 2010»
15 years 5 months ago
Implementation and Performance Evaluation of the re-ECN Protocol
Re-inserted ECN (re-ECN) is a proposed TCP/IP extension that informs the routers on a path about the estimated level of congestion. The re-ECN protocol extends the Explicit Congest...
Mirja Kühlewind, Michael Scharf
151
Voted
EUROPAR
2010
Springer
15 years 5 months ago
cTrust: Trust Aggregation in Cyclic Mobile Ad Hoc Networks
In a Cyclic Mobile Ad Hoc Network (CMANET) where nodes move cyclically, we formulate trust management problems and propose the cTrust scheme to handle trust establishment and aggre...
Huanyu Zhao, Xin Yang, Xiaolin Li
« Prev « First page 3240 / 3662 Last » Next »