Sciweavers

5580 search results - page 685 / 1116
» Randomized priority algorithms
Sort
View
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 3 months ago
An Empirical Study of Borda Manipulation
We study the problem of coalitional manipulation in elections using the unweighted Borda rule. We provide empirical evidence of the manipulability of Borda elections in the form o...
Jessica Davies, George Katsirelos, Nina Narodytska...
INFSOF
2008
85views more  INFSOF 2008»
15 years 3 months ago
Locating dependence structures using search-based slicing
This paper introduces an approach to locating dependence structures in a program by searching the space of the powerset of the set of all possible program slices. The paper formul...
Tao Jiang, Nicolas Gold, Mark Harman, Zheng Li
NECO
2007
90views more  NECO 2007»
15 years 3 months ago
Neighborhood Property-Based Pattern Selection for Support Vector Machines
Support Vector Machine (SVM) has been spotlighted in the machine learning community thanks to its theoretical soundness and practical performance. When applied to a large data set...
Hyunjung Shin, Sungzoon Cho
FGCS
2010
108views more  FGCS 2010»
15 years 2 months ago
The wandering token: Congestion avoidance of a shared resource
In a distributed system where scalability is an issue, like in a GRID [5], the problem of enforcing mutual exclusion often arises in a soft form: the infrequent failure of the mut...
Augusto Ciuffoletti
ORL
2010
85views more  ORL 2010»
15 years 2 months ago
Stable routing under the Spanning Tree Protocol
The Spanning Tree Protocol routes traffic on shortest path trees. If some edges fail, the traffic has to be rerouted consequently, setting up alternative trees. In this paper we d...
Fabrizio Grandoni, Gaia Nicosia, Gianpaolo Oriolo,...