Sciweavers

3639 search results - page 622 / 728
» Provenance as Dependency Analysis
Sort
View
91
Voted
MP
2010
94views more  MP 2010»
14 years 11 months ago
MIR closures of polyhedral sets
We study the mixed-integer rounding (MIR) closures of polyhedral sets. The MIR closure of a polyhedral set is equal to its split closure and the associated separation problem is N...
Sanjeeb Dash, Oktay Günlük, Andrea Lodi
130
Voted
NN
2010
Springer
225views Neural Networks» more  NN 2010»
14 years 11 months ago
Learning to imitate stochastic time series in a compositional way by chaos
This study shows that a mixture of RNN experts model can acquire the ability to generate sequences that are combination of multiple primitive patterns by means of self-organizing ...
Jun Namikawa, Jun Tani
110
Voted
P2P
2010
IEEE
187views Communications» more  P2P 2010»
14 years 11 months ago
Do BitTorrent-Like VoD Systems Scale under Flash-Crowds?
—The efficiency of BitTorrent for file sharing has inspired a number of BitTorrent-based P2P protocols for Videoon-Demand (VoD). It has been shown that these systems are scalab...
Lucia D'Acunto, Tamas Vinko, Johan A. Pouwelse
PE
2010
Springer
170views Optimization» more  PE 2010»
14 years 11 months ago
Approximating passage time distributions in queueing models by Bayesian expansion
We introduce Bayesian Expansion (BE), an approximate numerical technique for passage time distribution analysis in queueing networks. BE uses a class of Bayesian networks to appro...
Giuliano Casale
80
Voted
PVLDB
2010
107views more  PVLDB 2010»
14 years 11 months ago
On Multi-Column Foreign Key Discovery
A foreign/primary key relationship between relational tables is one of the most important constraints in a database. From a data analysis perspective, discovering foreign keys is ...
Meihui Zhang, Marios Hadjieleftheriou, Beng Chin O...