Sciweavers

3639 search results - page 686 / 728
» Provenance as Dependency Analysis
Sort
View
INFOCOM
2003
IEEE
15 years 3 months ago
Associative Search in Peer to Peer Networks: Harnessing Latent Semantics
— The success of a P2P file-sharing network highly depends on the scalability and versatility of its search mechanism. Two particularly desirable search features are scope (abil...
Edith Cohen, Amos Fiat, Haim Kaplan
ATAL
2003
Springer
15 years 2 months ago
Can software agents influence human relations?: balance theory in agent-mediated communities
We sought to create a social embodied conversational agent to support group interactions, using ‘balance theory’ from social science research on human-human relations. We cond...
Hideyuki Nakanishi, Satoshi Nakazawa, Toru Ishida,...
EMMCVPR
2003
Springer
15 years 2 months ago
Asymptotic Characterization of Log-Likelihood Maximization Based Algorithms and Applications
The asymptotic distribution of estimates that are based on a sub-optimal search for the maximum of the log-likelihood function is considered. In particular, estimation schemes that...
Doron Blatt, Alfred O. Hero
CLOUD
2010
ACM
15 years 2 months ago
Fluxo: a system for internet service programming by non-expert developers
Over the last 10–15 years, our industry has developed and deployed many large-scale Internet services, from e-commerce to social networking sites, all facing common challenges i...
Emre Kiciman, V. Benjamin Livshits, Madanlal Musuv...
COMPGEOM
2010
ACM
15 years 2 months ago
Kinetic stable Delaunay graphs
The best known upper bound on the number of topological changes in the Delaunay triangulation of a set of moving points in R2 is (nearly) cubic, even if each point is moving with ...
Pankaj K. Agarwal, Jie Gao, Leonidas J. Guibas, Ha...