Sciweavers

1888 search results - page 302 / 378
» Proof theory and computational analysis
Sort
View
WWW
2004
ACM
16 years 16 days ago
Propagation of trust and distrust
A (directed) network of people connected by ratings or trust scores, and a model for propagating those trust scores, is a fundamental building block in many of today's most s...
Ramanathan V. Guha, Ravi Kumar, Prabhakar Raghavan...
STOC
2005
ACM
143views Algorithms» more  STOC 2005»
16 years 4 days ago
Optimal approximations of the frequency moments of data streams
We give a 1-pass ~O(m1-2/k )-space algorithm for computing the k-th frequency moment of a data stream for any real k > 2. Together with the lower bounds of [1, 2, 4], this reso...
Piotr Indyk, David P. Woodruff
MOBIHOC
2007
ACM
15 years 11 months ago
Allocating dynamic time-spectrum blocks in cognitive radio networks
A number of studies have shown the abundance of unused spectrum in the TV bands. This is in stark contrast to the overcrowding of wireless devices in the ISM bands. A recent trend...
Yuan Yuan, Paramvir Bahl, Ranveer Chandra, Thomas ...
CSCW
2010
ACM
15 years 8 months ago
An empirical study of critical mass and online community survival
There is general consensus that critical mass at inception ensures the sustained success of online communities. However, no clear understanding of what constitutes such a 'cr...
Daphne R. Raban, Mihai Moldovan, Quentin Jones
AINA
2009
IEEE
15 years 6 months ago
Modeling Multiprocessor Cache Protocol Impact on MPI Performance
This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu