Sciweavers

3552 search results - page 708 / 711
» Proof theory in the abstract
Sort
View
ML
2010
ACM
127views Machine Learning» more  ML 2010»
14 years 8 months ago
Stability and model selection in k-means clustering
Abstract Clustering Stability methods are a family of widely used model selection techniques for data clustering. Their unifying theme is that an appropriate model should result in...
Ohad Shamir, Naftali Tishby
TON
2010
93views more  TON 2010»
14 years 8 months ago
On suitability of Euclidean embedding for host-based network coordinate systems
Abstract—In this paper, we investigate the suitability of embedding Internet hosts into a Euclidean space given their pairwise distances (as measured by round-trip time). Using t...
Sanghwan Lee, Zhi-Li Zhang, Sambit Sahu, Debanjan ...
CORR
2011
Springer
243views Education» more  CORR 2011»
14 years 4 months ago
Deterministic Network Model Revisited: An Algebraic Network Coding Approach
Abstract—The capacity of multiuser networks has been a longstanding problem in information theory. Recently, Avestimehr et al. have proposed a deterministic network model to appr...
MinJi Kim, Elona Erez, Edmund M. Yeh, Muriel M&eac...
CORR
2010
Springer
127views Education» more  CORR 2010»
14 years 4 months ago
Complexity of Data Dependence problems for Program Schemas with Concurrency
am analysis and has been widely studied. In this paper we consider this problem at the abstraction level of program schemas in which computations occur in the Herbrand domain of te...
Sebastian Danicic, Robert M. Hierons, Michael R. L...
94
Voted
TII
2010
146views Education» more  TII 2010»
14 years 4 months ago
PAUC: Power-Aware Utilization Control in Distributed Real-Time Systems
Abstract--CPU utilization control has recently been demonstrated to be an effective way of meeting end-to-end deadlines for distributed real-time systems running in unpredictable e...
Xiaorui Wang, Xing Fu, Xue Liu, Zonghua Gu