Sciweavers

1110 search results - page 152 / 222
» New Approximation Results for Resource Replication Problems
Sort
View
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
15 years 11 months ago
Efficient influence maximization in social networks
Influence maximization is the problem of finding a small subset of nodes (seed nodes) in a social network that could maximize the spread of influence. In this paper, we study the ...
Wei Chen, Yajun Wang, Siyu Yang
BMCBI
2010
108views more  BMCBI 2010»
14 years 8 months ago
Prediction of RNA secondary structure by maximizing pseudo-expected accuracy
Background: Recent studies have revealed the importance of considering the entire distribution of possible secondary structures in RNA secondary structure predictions; therefore, ...
Michiaki Hamada, Kengo Sato, Kiyoshi Asai
EUSFLAT
2007
156views Fuzzy Logic» more  EUSFLAT 2007»
15 years 13 days ago
Fuzzy Calculating and Fuzzy Control in Wireless Sensor Network
At present time configurable wireless sensor networks are given special consideration. Wireless sensor networks are now a static elements union. To make such a network a powerful ...
Irina Kalganova
CORR
2006
Springer
160views Education» more  CORR 2006»
14 years 11 months ago
Frugality ratios and improved truthful mechanisms for vertex cover
In set-system auctions, there are several overlapping teams of agents, and a task that can be completed by any of these teams. The auctioneer's goal is to hire a team and pay...
Edith Elkind, Leslie Ann Goldberg, Paul W. Goldber...
AIMS
2009
Springer
15 years 3 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...