Sciweavers

7853 search results - page 1291 / 1571
» Learning from Each Other
Sort
View
87
Voted
CORR
2008
Springer
92views Education» more  CORR 2008»
15 years 26 days ago
Nonnegative Matrix Factorization via Rank-One Downdate
Nonnegative matrix factorization (NMF) was popularized as a tool for data mining by Lee and Seung in 1999. NMF attempts to approximate a matrix with nonnegative entries by a produ...
Michael Biggs, Ali Ghodsi, Stephen A. Vavasis
82
Voted
CORR
2008
Springer
77views Education» more  CORR 2008»
15 years 26 days ago
Energy-efficient Scheduling of Delay Constrained Traffic over Fading Channels
Abstract--A delay-constrained scheduling problem for pointto-point communication is considered: a packet of B bits must be transmitted by a hard deadline of T slots over a timevary...
Juyul Lee, Nihar Jindal
100
Voted
DCG
2008
101views more  DCG 2008»
15 years 25 days ago
On the Hardness of Computing Intersection, Union and Minkowski Sum of Polytopes
For polytopes P1, P2 Rd we consider the intersection P1 P2, the convex hull of the union CH(P1 P2), and the Minkowski sum P1 + P2. For Minkowski sum we prove that enumerating t...
Hans Raj Tiwary
92
Voted
ENTCS
2010
127views more  ENTCS 2010»
15 years 25 days ago
Combining Model Reductions
Molecular biological models usually suffer from a large combinatorial explosion. Indeed, proteins form complexes and modify each others, which leads to the formation of a huge num...
Ferdinanda Camporesi, Jérôme Feret, H...
119
Voted
ADHOC
2006
87views more  ADHOC 2006»
15 years 25 days ago
Medium Access Control protocols for ad hoc wireless networks: A survey
Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols a...
Sunil Kumar, Vineet S. Raghavan, Jing Deng
« Prev « First page 1291 / 1571 Last » Next »