Sciweavers

2131 search results - page 343 / 427
» Immunity for Closed Sets
Sort
View
ISCC
2005
IEEE
114views Communications» more  ISCC 2005»
15 years 5 months ago
Localized Broadcast Incremental Power Protocol for Wireless Ad Hoc Networks
— As broadcasting is widely used for miscellaneous maintenance operations in wireless ad hoc networks, where energy is a scarce resource, an efficient broadcasting protocol is o...
François Ingelrest, David Simplot-Ryl
TLDI
2005
ACM
102views Formal Methods» more  TLDI 2005»
15 years 5 months ago
An open and shut typecase
Two different ways of defining ad-hoc polymorphic operations commonly occur in programming languages. With the first form polymorphic operations are defined inductively on the...
Dimitrios Vytiniotis, Geoffrey Washburn, Stephanie...
CIKM
2005
Springer
15 years 5 months ago
Feature-based recommendation system
The explosive growth of the world-wide-web and the emergence of e-commerce has led to the development of recommender systems—a personalized information filtering technology use...
Eui-Hong Han, George Karypis
82
Voted
VLDB
2005
ACM
116views Database» more  VLDB 2005»
15 years 5 months ago
Client Assignment in Content Dissemination Networks for Dynamic Data
Consider a content distribution network consisting of a set of sources, repositories and clients where the sources and the repositories cooperate with each other for efficient di...
Shetal Shah, Krithi Ramamritham, Chinya V. Ravisha...
WINE
2005
Springer
109views Economy» more  WINE 2005»
15 years 5 months ago
Subjective-Cost Policy Routing
We study a model of path-vector routing in which nodes’ routing policies are based on subjective cost assessments of alternative routes. The routes are constrained by the requir...
Joan Feigenbaum, David R. Karger, Vahab S. Mirrokn...