Sciweavers

8266 search results - page 1650 / 1654
» Information About the Journal
Sort
View
KDD
2012
ACM
201views Data Mining» more  KDD 2012»
13 years 4 months ago
Low rank modeling of signed networks
Trust networks, where people leave trust and distrust feedback, are becoming increasingly common. These networks may be regarded as signed graphs, where a positive edge weight cap...
Cho-Jui Hsieh, Kai-Yang Chiang, Inderjit S. Dhillo...
126
Voted
TON
2012
13 years 4 months ago
A Game-Theoretic Approach to Anonymous Networking
—Anonymous wireless networking is studied when an adversary monitors the transmission timing of an unknown subset of the network nodes. For a desired quality of service (QoS), as...
Parvathinathan Venkitasubramaniam, Lang Tong
SODA
2012
ACM
170views Algorithms» more  SODA 2012»
13 years 4 months ago
Compression via matroids: a randomized polynomial kernel for odd cycle transversal
The Odd Cycle Transversal problem (OCT) asks whether a given graph can be made bipartite by deleting at most k of its vertices. In a breakthrough result Reed, Smith, and Vetta (Op...
Stefan Kratsch, Magnus Wahlström
ISCA
2012
IEEE
208views Hardware» more  ISCA 2012»
13 years 4 months ago
Harmony: Collection and analysis of parallel block vectors
Efficient execution of well-parallelized applications is central to performance in the multicore era. Program analysis tools support the hardware and software sides of this effor...
Melanie Kambadur, Kui Tang, Martha A. Kim
115
Voted
TVCG
2012
195views Hardware» more  TVCG 2012»
13 years 4 months ago
Hierarchical Streamline Bundles
—Effective three-dimensional streamline placement and visualization plays an essential role in many science and engineering disciplines. The main challenge for effective streamli...
Hongfeng Yu, Chaoli Wang, Ching-Kuang Shene, Jacqu...
« Prev « First page 1650 / 1654 Last » Next »