Sciweavers

2863 search results - page 190 / 573
» Constructing minimum-interference networks
Sort
View
132
Voted
TSP
2010
14 years 10 months ago
Distributed learning in multi-armed bandit with multiple players
We formulate and study a decentralized multi-armed bandit (MAB) problem. There are distributed players competing for independent arms. Each arm, when played, offers i.i.d. reward a...
Keqin Liu, Qing Zhao
PODC
2011
ACM
14 years 6 months ago
From bounded to unbounded concurrency objects and back
We consider the power of objects in the unbounded concurrency shared memory model, where there is an infinite set of processes and the number of processes active concurrently may...
Yehuda Afek, Adam Morrison, Guy Wertheim
141
Voted
CIKM
2011
Springer
14 years 3 months ago
Building directories for social tagging systems
Today, a number of algorithms exist for constructing tag hierarchies from social tagging data. While these algorithms were designed with ontological goals in mind, we know very li...
Denis Helic, Markus Strohmaier
106
Voted
MOBIHOC
2006
ACM
16 years 3 months ago
Energy conservation via domatic partitions
Using a dominating set as a coordinator in wireless networks has been proposed in many papers as an energy conservation technique. Since the nodes in a dominating set have the ext...
Sriram V. Pemmaraju, Imran A. Pirwani
139
Voted
IPSN
2010
Springer
15 years 10 months ago
Covering space for in-network sensor data storage
For in-network storage schemes, one maps data, indexed in a logical space, to the distributed sensor locations. When the physical sensor network has an irregular shape and possibl...
Rik Sarkar, Wei Zeng, Jie Gao, Xianfeng David Gu