Sciweavers

1110 search results - page 152 / 222
» New Approximation Results for Resource Replication Problems
Sort
View
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
16 years 4 months ago
Efficient influence maximization in social networks
Influence maximization is the problem of finding a small subset of nodes (seed nodes) in a social network that could maximize the spread of influence. In this paper, we study the ...
Wei Chen, Yajun Wang, Siyu Yang
BMCBI
2010
108views more  BMCBI 2010»
15 years 1 months ago
Prediction of RNA secondary structure by maximizing pseudo-expected accuracy
Background: Recent studies have revealed the importance of considering the entire distribution of possible secondary structures in RNA secondary structure predictions; therefore, ...
Michiaki Hamada, Kengo Sato, Kiyoshi Asai
EUSFLAT
2007
156views Fuzzy Logic» more  EUSFLAT 2007»
15 years 5 months ago
Fuzzy Calculating and Fuzzy Control in Wireless Sensor Network
At present time configurable wireless sensor networks are given special consideration. Wireless sensor networks are now a static elements union. To make such a network a powerful ...
Irina Kalganova
CORR
2006
Springer
160views Education» more  CORR 2006»
15 years 4 months ago
Frugality ratios and improved truthful mechanisms for vertex cover
In set-system auctions, there are several overlapping teams of agents, and a task that can be completed by any of these teams. The auctioneer's goal is to hire a team and pay...
Edith Elkind, Leslie Ann Goldberg, Paul W. Goldber...
AIMS
2009
Springer
15 years 8 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...