Sciweavers

1080 search results - page 107 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
ICDCS
2006
IEEE
15 years 3 months ago
Elastic Routing Table with Provable Performance for Congestion Control in DHT Networks
Distributed hash table (DHT) networks based on consistent hashing functions have an inherent load balancing problem. The problem becomes more severe due to the heterogeneity of ne...
Haiying Shen, Cheng-Zhong Xu
AIED
2009
Springer
15 years 4 months ago
Will Google destroy western democracy? Bias in policy problem solving
: Democracy requires students to choose policy positions based on evidence, yet confirmation bias prevents them from doing so. As a preliminary step in building a policy reasoning ...
Matthew W. Easterday, Vincent Aleven, Richard Sche...
AIED
2005
Springer
15 years 3 months ago
The Use of Qualitative Reasoning Models of Interactions between Populations to Support Causal Reasoning of Deaf Students
Making inferences is crucial for understanding the world. The school may develop such skills but there are few formal opportunities for that. This paper describes an experiment de...
Paulo Salles, Heloisa Lima-Salles, Bert Bredeweg
AAAI
1990
14 years 11 months ago
Generalized Shape Autocorrelation
This paper presents an efficient and homogeneous paradigm for automatic acquisition and recognition of nonparametric shapes. Acquisition time varies from linear to cubic in the nu...
Andrea Califano, Rakesh Mohan
CORR
2010
Springer
186views Education» more  CORR 2010»
14 years 10 months ago
Significant Interval and Frequent Pattern Discovery in Web Log Data
There is a considerable body of work on sequence mining of Web Log Data We are using One Pass frequent Episode discovery (or FED) algorithm, takes a different approach than the tr...
Kanak Saxena, Rahul Shukla