Sciweavers

5499 search results - page 981 / 1100
» Generalized Rewrite Theories
Sort
View
MOBICOM
2009
ACM
15 years 7 months ago
Capacity of large-scale CSMA wireless networks
In the literature, asymptotic studies of multi-hop wireless network capacity often consider only centralized and deterministic TDMA (time-division multi-access) coordination schem...
Chi-Kin Chau, Minghua Chen, Soung Chang Liew
RECSYS
2009
ACM
15 years 7 months ago
An incentive-based architecture for social recommendations
We present an incentive-based architecture for providing recommendations in a social network. We maintain a distinct reputation system for each individual and we rely on users to ...
Rajat Bhattacharjee, Ashish Goel, Konstantinos Kol...
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 7 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
SIGECOM
2009
ACM
118views ECommerce» more  SIGECOM 2009»
15 years 7 months ago
Modeling volatility in prediction markets
There is significant experimental evidence that prediction markets are efficient mechanisms for aggregating information and are more accurate in forecasting events than tradition...
Nikolay Archak, Panagiotis G. Ipeirotis
SIGIR
2009
ACM
15 years 7 months ago
Approximating true relevance distribution from a mixture model based on irrelevance data
Pseudo relevance feedback (PRF), which has been widely applied in IR, aims to derive a distribution from the top n pseudo relevant documents D. However, these documents are often ...
Peng Zhang, Yuexian Hou, Dawei Song