Sciweavers

3211 search results - page 259 / 643
» In Search of the Bullwhip Effect
Sort
View
93
Voted
ICDCS
2007
IEEE
15 years 7 months ago
Scale-Free Overlay Topologies with Hard Cutoffs for Unstructured Peer-to-Peer Networks
In unstructured peer-to-peer (P2P) networks, the overlay topology (or connectivity graph) among peers is a crucial component in addition to the peer/data organization and search. ...
Hasan Guclu, Murat Yuksel
ICTAI
2007
IEEE
15 years 7 months ago
Adaptive Lookahead for Answer Set Computation
Lookahead is a well-known constraint propagation technique for DPLL-based SAT and answer set solvers. Despite its space pruning power, it can also slow down the search, due to its...
Guohua Liu, Jia-Huai You
98
Voted
CIKM
2007
Springer
15 years 7 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
ICPR
2006
IEEE
15 years 6 months ago
A Pixel-wise Object Tracking Algorithm with Target and Background Sample
In this paper, we present a clustering-based tracking algorithm for non-rigid object. Non-rigid object tracking is a challenging task because the target often appears as a concave...
Chunsheng Hua, Haiyuan Wu, Qian Chen, Toshikazu Wa...
SAINT
2006
IEEE
15 years 6 months ago
Mill: An Information Management and Retrieval Method Considering Geographical Location on Ubiquitous Environment
To leverage location-related information is useful to get an in-depth perspective on environmental circumstances, traffic situations and/or other problems. To handle the large nu...
Satoshi Matsuura, Kazutoshi Fujikawa, Hideki Sunah...