Sciweavers

10907 search results - page 2116 / 2182
» Constraint Based Strategies
Sort
View
ESA
2009
Springer
122views Algorithms» more  ESA 2009»
15 years 4 months ago
Bounded Budget Betweenness Centrality Game for Strategic Network Formations
In this paper, we introduce the bounded budget betweenness centrality game, a strategic network formation game in which nodes build connections subject to a budget constraint in or...
Xiaohui Bei, Wei Chen, Shang-Hua Teng, Jialin Zhan...
PKDD
2009
Springer
134views Data Mining» more  PKDD 2009»
15 years 4 months ago
Mining Graph Evolution Rules
In this paper we introduce graph-evolution rules, a novel type of frequency-based pattern that describe the evolution of large networks over time, at a local level. Given a sequenc...
Michele Berlingerio, Francesco Bonchi, Björn ...
PRIB
2009
Springer
120views Bioinformatics» more  PRIB 2009»
15 years 4 months ago
Knowledge-Guided Docking of WW Domain Proteins and Flexible Ligands
Studies of interactions between protein domains and ligands are important in many aspects such as cellular signaling. We present a knowledge-guided approach for docking protein dom...
Haiyun Lu, Hao Li, Shamima Banu Bte Sm Rashid, Wee...
ISLPED
2009
ACM
178views Hardware» more  ISLPED 2009»
15 years 4 months ago
Power management in energy harvesting embedded systems with discrete service levels
Power management has been a critical issue in the design of embedded systems due to the limited power supply. To prolong the lifetime, energy minimization has been studied under p...
Clemens Moser, Jian-Jia Chen, Lothar Thiele
SACMAT
2009
ACM
15 years 4 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
« Prev « First page 2116 / 2182 Last » Next »