Sciweavers

15073 search results - page 2811 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
MSWIM
2004
ACM
15 years 7 months ago
Scalable simulation of large-scale wireless networks with bounded inaccuracies
Discrete event network simulators have emerged as popular tools for verification and performance evaluation for various wireless networks. Nevertheless, the desire to model such ...
Zhengrong Ji, Junlan Zhou, Mineo Takai, Rajive Bag...
ICTAC
2004
Springer
15 years 7 months ago
A Proof of Weak Termination Providing the Right Way to Terminate
We give an inductive method for proving weak innermost termination of rule-based programs, from which we automatically infer, for each successful proof, a finite strategy for data...
Olivier Fissore, Isabelle Gnaedig, Hél&egra...
ATAL
2003
Springer
15 years 7 months ago
Risk-averse auction agents
Auctions are an important means for purchasing material in the era of e-commerce. Research on auctions often studies them in isolation. In practice, however, auction agents are pa...
Yaxin Liu, Richard Goodwin, Sven Koenig
ICALP
2010
Springer
15 years 6 months ago
A Topological Approach to Recognition
We propose a new approach to the notion of recognition, which departs from the classical definitions by three specific features. First, it does not rely on automata. Secondly, it...
Mai Gehrke, Serge Grigorieff, Jean-Eric Pin
EDM
2008
127views Data Mining» more  EDM 2008»
15 years 3 months ago
Adaptive Test Design with a Naive Bayes Framework
Bayesian graphical models are commonly used to build student models from data. A number of standard algorithms are available to train Bayesian models from student skills assessment...
Michel C. Desmarais, Alejandro Villarreal, Michel ...
« Prev « First page 2811 / 3015 Last » Next »