Sciweavers

2131 search results - page 398 / 427
» Immunity for Closed Sets
Sort
View
IQ
2001
15 years 24 days ago
Information Envelope and its Information Integrity Implications
: Physical and informational works are strongly interrelated in a business process. This facilitates modeling a business process as an integral part of a closed loop information an...
Vijay V. Mandke, Madhavan K. Nayar, Kamna Malik
SODA
2001
ACM
188views Algorithms» more  SODA 2001»
15 years 24 days ago
Approximation algorithms for the 0-extension problem
In the 0-extension problem, we are given a weighted graph with some nodes marked as terminals and a semimetric on the set of terminals. Our goal is to assign the rest of the nodes ...
Gruia Calinescu, Howard J. Karloff, Yuval Rabani
SODA
2001
ACM
87views Algorithms» more  SODA 2001»
15 years 24 days ago
Steiner points in tree metrics don't (really) help
Consider an edge-weighted tree T = (V, E, w : E R+ ), in which a subset R of the nodes (called the required nodes) are colored red and the remaining nodes in S = V \R are colored ...
Anupam Gupta
TREC
2004
15 years 23 days ago
Overview of the TREC 2004 Question Answering Track
The TREC 2004 Question Answering track contained a single task in which question series were used to define a set of targets. Each series contained factoid and list questions and ...
Ellen M. Voorhees
WSC
2004
15 years 23 days ago
Building Credible Input Models
Most discrete-event simulation models have stochastic elements that mimic the probabilistic nature of the system under consideration. A close match between the input model and the...
Lawrence Leemis