Sciweavers

12257 search results - page 2121 / 2452
» Analysis of Algorithms
Sort
View
SASN
2006
ACM
15 years 10 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
SIGCSE
2006
ACM
163views Education» more  SIGCSE 2006»
15 years 10 months ago
TextMOLE: text mining operations library and environment
The paper describes the first version of the TextMOLE (Text Mining Operations Library and Environment) system for textual data mining. Currently TextMOLE acts as an advanced inde...
Daniel B. Waegel, April Kontostathis
SIGCSE
2006
ACM
147views Education» more  SIGCSE 2006»
15 years 10 months ago
Image understanding as a second course in AI: preparing students for research
This paper describes the development and structure of a second course in artificial intelligence that was developed to meet the needs of upper-division undergraduate and graduate ...
Roxanne L. Canosa
SIGECOM
2006
ACM
107views ECommerce» more  SIGECOM 2006»
15 years 10 months ago
Empirical mechanism design: methods, with application to a supply-chain scenario
Our proposed methods employ learning and search techniques to estimate outcome features of interest as a function of mechanism parameter settings. We illustrate our approach with ...
Yevgeniy Vorobeychik, Christopher Kiekintveld, Mic...
SIGIR
2006
ACM
15 years 10 months ago
Formal models for expert finding in enterprise corpora
Searching an organization’s document repositories for experts provides a cost effective solution for the task of expert finding. We present two general strategies to expert se...
Krisztian Balog, Leif Azzopardi, Maarten de Rijke
« Prev « First page 2121 / 2452 Last » Next »