Sciweavers

1888 search results - page 267 / 378
» Proof theory and computational analysis
Sort
View
SIGECOM
2005
ACM
153views ECommerce» more  SIGECOM 2005»
15 years 7 months ago
Marginal contribution nets: a compact representation scheme for coalitional games
We present a new approach to representing coalitional games based on rules that describe the marginal contributions of the agents. This representation scheme captures characterist...
Samuel Ieong, Yoav Shoham
ISSAC
2004
Springer
135views Mathematics» more  ISSAC 2004»
15 years 7 months ago
The truncated fourier transform and applications
In this paper, we present a truncated version of the classical Fast Fourier Transform. When applied to polynomial multiplication, this algorithm has the nice property of eliminati...
Joris van der Hoeven
COLING
2002
15 years 1 months ago
Cross Linguistic Phoneme Correspondences
Cross-linguistic phoneme correspondences, or metaphonemes1 , can be defined across languages which are relatively closely related in exactly the same way as correspondences can be...
Lynne J. Cahill, Carole Tiberius
SDM
2010
SIAM
181views Data Mining» more  SDM 2010»
14 years 11 months ago
Efficient Nonnegative Matrix Factorization with Random Projections
The recent years have witnessed a surge of interests in Nonnegative Matrix Factorization (NMF) in data mining and machine learning fields. Despite its elegant theory and empirical...
Fei Wang, Ping Li
116
Voted
IMCS
2007
144views more  IMCS 2007»
15 years 1 months ago
On the imbalance of the security problem space and its expected consequences
Purpose – This paper aims to report on the results of an analysis of the computer security problem space, to suggest the areas with highest potential for making progress in the ...
Konstantin Beznosov, Olga Beznosova