Sciweavers

2736 search results - page 472 / 548
» Implementable allocation rules
Sort
View
DKE
2008
159views more  DKE 2008»
15 years 18 days ago
Isolated items discarding strategy for discovering high utility itemsets
Traditional methods of association rule mining consider the appearance of an item in a transaction, whether or not it is purchased, as a binary variable. However, customers may pu...
Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
102
Voted
EOR
2010
110views more  EOR 2010»
15 years 18 days ago
Online scheduling policies for multiclass call centers with impatient customers
We consider a call center with two classes of impatient customers: premium and regular classes. Modeling our call center as a multiclass GI/GI/s + M queue, we focus on developing ...
Oualid Jouini, Auke Pot, Ger Koole, Yves Dallery
CORR
2006
Springer
132views Education» more  CORR 2006»
15 years 17 days ago
Packrat Parsing: Simple, Powerful, Lazy, Linear Time
Packrat parsing is a novel technique for implementing parsers in a lazy functional programming language. A packrat parser provides the power and flexibility of top-down parsing wi...
Bryan Ford
85
Voted
JAIR
2008
103views more  JAIR 2008»
15 years 15 days ago
ICE: An Expressive Iterative Combinatorial Exchange
We present the design and analysis of the first fully expressive, iterative combinatorial exchange (ICE). The exchange incorporates a tree-based bidding language (TBBL) that is co...
Benjamin Lubin, Adam I. Juda, Ruggiero Cavallo, S&...
103
Voted
JASIS
2008
76views more  JASIS 2008»
15 years 15 days ago
Using importance flooding to identify interesting networks of criminal activity
Abstract. In spite of policy concerns and high costs, the law enforcement community is investing heavily in data sharing initiatives. Cross-jurisdictional criminal justice informat...
Byron Marshall, Hsinchun Chen, Siddharth Kaza