Sciweavers

6906 search results - page 126 / 1382
» An algorithm for modelling key terms
Sort
View
ATAL
2008
Springer
15 years 6 months ago
An approach to online optimization of heuristic coordination algorithms
Due to computational intractability, large scale coordination algorithms are necessarily heuristic and hence require tuning for particular environments. In domains where character...
Jumpol Polvichai, Paul Scerri, Michael Lewis
141
Voted
GECCO
2006
Springer
214views Optimization» more  GECCO 2006»
15 years 8 months ago
A new discrete particle swarm algorithm applied to attribute selection in a bioinformatics data set
Many data mining applications involve the task of building a model for predictive classification. The goal of such a model is to classify examples (records or data instances) into...
Elon S. Correa, Alex Alves Freitas, Colin G. Johns...
AAECC
2006
Springer
77views Algorithms» more  AAECC 2006»
15 years 4 months ago
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes...
Mihir Bellare, Adriana Palacio
JCM
2006
96views more  JCM 2006»
15 years 4 months ago
Distributed Algorithms for Dynamic Bandwidth Provisioning in Communication Networks
Efficient dynamic resource provisioning algorithms are necessary to the development and automation of Quality of Service (QoS) networks. The main goal of these algorithms is to off...
Jocelyne Elias, Fabio Martignon, Antonio Capone, G...
SIGECOM
2009
ACM
112views ECommerce» more  SIGECOM 2009»
15 years 11 months ago
Network bargaining: algorithms and structural results
We consider models for bargaining in social networks, in which players are represented by vertices and edges represent bilateral opportunities for deals between pairs of players. ...
Tanmoy Chakraborty, Michael Kearns, Sanjeev Khanna