Sciweavers

6906 search results - page 1125 / 1382
» An algorithm for modelling key terms
Sort
View
CONEXT
2005
ACM
15 years 7 months ago
Root cause analysis for long-lived TCP connections
While the applications using the Internet have changed over time, TCP is still the dominating transport protocol that carries over 90% of the total traffic. Throughput is the key...
Matti Siekkinen, Guillaume Urvoy-Keller, Ernst W. ...
130
Voted
ECIR
2008
Springer
15 years 6 months ago
A Comparison of Social Bookmarking with Traditional Search
Abstract. Social bookmarking systems allow users to store links to internet resources on a web page. As social bookmarking systems are growing in popularity, search algorithms have...
Beate Krause, Andreas Hotho, Gerd Stumme
IJCAI
2007
15 years 6 months ago
Document Summarization Using Conditional Random Fields
Many methods, including supervised and unsupervised algorithms, have been developed for extractive document summarization. Most supervised methods consider the summarization task ...
Dou Shen, Jian-Tao Sun, Hua Li, Qiang Yang, Zheng ...
ATAL
2010
Springer
15 years 6 months ago
A logic-based representation for coalitional games with externalities
We consider the issue of representing coalitional games in multiagent systems that exhibit externalities from coalition formation, i.e., systems in which the gain from forming a c...
Tomasz P. Michalak, Dorota Marciniak, Marcin Szamo...
CIDR
2009
140views Algorithms» more  CIDR 2009»
15 years 6 months ago
Energy Efficiency: The New Holy Grail of Data Management Systems Research
Energy costs are quickly rising in large-scale data centers and are soon projected to overtake the cost of hardware. As a result, data center operators have recently started turni...
Stavros Harizopoulos, Mehul A. Shah, Justin Meza, ...
« Prev « First page 1125 / 1382 Last » Next »