Sciweavers

1521 search results - page 166 / 305
» Efficient Design Validation Based on Cultural Algorithms
Sort
View
SIGMOD
2010
ACM
239views Database» more  SIGMOD 2010»
14 years 10 months ago
Call to order: a hierarchical browsing approach to eliciting users' preference
Computing preference queries has received a lot of attention in the database community. It is common that the user is unsure of his/her preference, so care must be taken to elicit...
Feng Zhao, Gautam Das, Kian-Lee Tan, Anthony K. H....
CORR
2010
Springer
174views Education» more  CORR 2010»
14 years 10 months ago
Hybrid Numerical Solution of the Chemical Master Equation
We present a numerical approximation technique for the analysis of continuous-time Markov chains that describe networks of biochemical reactions and play an important role in the ...
Thomas A. Henzinger, Maria Mateescu, Linar Mikeev,...
ISCI
2008
116views more  ISCI 2008»
14 years 10 months ago
Discovery of maximum length frequent itemsets
The use of frequent itemsets has been limited by the high computational cost as well as the large number of resulting itemsets. In many real-world scenarios, however, it is often ...
Tianming Hu, Sam Yuan Sung, Hui Xiong, Qian Fu
TC
2002
14 years 9 months ago
Distributed Call Admission Control for a Heterogeneous PCS Network
Abstract--Personal communication service (PCS) networks offer mobile users multimedia applications with different quality-ofservice (QoS) and bandwidth requirements. This paper pro...
Yieh-Ran Haung, Jan-Ming Ho
GIS
2009
ACM
14 years 7 months ago
Distortion-based anonymity for continuous queries in location-based mobile services
Privacy preservation has recently received considerable attention for location-based mobile services. Various location cloaking approaches have been proposed to protect the locati...
Xiao Pan, Xiaofeng Meng, Jianliang Xu