Sciweavers

5948 search results - page 211 / 1190
» Computing Robust Counter-Strategies
Sort
View
JDA
2008
85views more  JDA 2008»
15 years 3 months ago
A robust randomized algorithm to perform independent tasks
The Do-All problem is about scheduling t similar and independent tasks to be performed by p processors prone to crashes. We assume that the distributed system is synchronous with ...
Bogdan S. Chlebus, Leszek Gasieniec, Dariusz R. Ko...
128
Voted
COLING
2002
15 years 3 months ago
Fertilization of Case Frame Dictionary for Robust Japanese Case Analysis
This paper proposes a method of fertilizing a Japanese case frame dictionary to handle complicated expressions: double nominative sentences, non-gapping relation of relative claus...
Daisuke Kawahara, Sadao Kurohashi
194
Voted
SIGMOD
2005
ACM
106views Database» more  SIGMOD 2005»
16 years 3 months ago
Tributaries and Deltas: Efficient and Robust Aggregation in Sensor Network Streams
Existing energy-efficient approaches to in-network aggregation in sensor networks can be classified into two categories, tree-based and multi-path-based, with each having unique s...
Amit Manjhi, Suman Nath, Phillip B. Gibbons
ICS
2010
Tsinghua U.
16 years 24 days ago
Robustly Leveraging Collusion in Combinatorial Auctions
feuse of its devstting eets in utions nd other mehnismsD ollusion is prohiited nd leglly proseutedF etD olluders hve lwys existedD nd my ontinue to existF e thus rise the followin...
Jing Chen, Silvio Micali, Paul Valiant
ICCAD
2005
IEEE
125views Hardware» more  ICCAD 2005»
16 years 9 days ago
Robust mixed-size placement under tight white-space constraints
A novel and very simple correct-by-construction top-down methodology for high-utilization mixed-size placement is presented. The PolarBear algorithm combines recursive cutsize-dri...
Jason Cong, Michail Romesis, Joseph R. Shinnerl