Sciweavers

702 search results - page 74 / 141
» Identifying Graph Automorphisms Using Determining Sets
Sort
View
CORR
2008
Springer
174views Education» more  CORR 2008»
14 years 12 months ago
Bounded Budget Connection (BBC) Games or How to make friends and influence people, on a budget
Motivated by applications in social networks, peer-to-peer and overlay networks, we define and study the Bounded Budget Connection (BBC) game - we have a collection of n players o...
Nikolaos Laoutaris, Laura J. Poplawski, Rajmohan R...
FSKD
2006
Springer
298views Fuzzy Logic» more  FSKD 2006»
15 years 3 months ago
Risk Assessment of E-Commerce Projects Using Evidential Reasoning
The purpose of this study is to develop a decision making system to evaluate the risks in E-Commerce (EC) projects. Competitive software businesses have the critical task of assess...
Rashid Hafeez Khokhar, David A. Bell, Jiwen Guan, ...
WCRE
2005
IEEE
15 years 5 months ago
When Functions Change Their Names: Automatic Detection of Origin Relationships
It is a common understanding that identifying the same entity such as module, file, and function between revisions is important for software evolution related analysis. Most softw...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.
BMCBI
2010
130views more  BMCBI 2010»
14 years 12 months ago
A statistical approach to finding overlooked genetic associations
Background: Complexity and noise in expression quantitative trait loci (eQTL) studies make it difficult to distinguish potential regulatory relationships among the many interactio...
Andrew K. Rider, Geoffrey Siwo, Nitesh V. Chawla, ...
CCGRID
2009
IEEE
15 years 6 months ago
Multicast Trees for Collaborative Applications
—Current implementations of real-time collaborative applications rely on a dedicated infrastructure to carry out all synchronizing and communication functions, and require all en...
Krzysztof Rzadca, Jackson Tan Teck Yong, Anwitaman...