Sciweavers

5580 search results - page 815 / 1116
» Randomized priority algorithms
Sort
View
ICDM
2003
IEEE
158views Data Mining» more  ICDM 2003»
15 years 8 months ago
Combining Multiple Weak Clusterings
A data set can be clustered in many ways depending on the clustering algorithm employed, parameter settings used and other factors. Can multiple clusterings be combined so that th...
Alexander P. Topchy, Anil K. Jain, William F. Punc...
INFOCOM
2003
IEEE
15 years 8 months ago
Distributed Queueing in Scalable High Performance Routers
—This paper presents and evaluates distributed queueing algorithms for regulating the flow of traffic through large, high performance routers. Distributed queueing has a similar ...
Prashanth Pappu, Jyoti Parwatikar, Jonathan S. Tur...
INFOCOM
2003
IEEE
15 years 8 months ago
Sensor Deployment and Target Localization Based on Virtual Forces
— The effectiveness of cluster-based distributed sensor networks depends to a large extent on the coverage provided by the sensor deployment. We propose a virtual force algorithm...
Yi Zou, Krishnendu Chakrabarty
SSDBM
2003
IEEE
96views Database» more  SSDBM 2003»
15 years 8 months ago
Space Constrained Selection Problems for Data Warehouses and Pervasive Computing
Space constrained optimization problems arise in a multitude of important applications such as data warehouses and pervasive computing. A typical instance of such problems is to s...
Themistoklis Palpanas, Nick Koudas, Alberto O. Men...
SIGECOM
2003
ACM
107views ECommerce» more  SIGECOM 2003»
15 years 8 months ago
Using value queries in combinatorial auctions
Combinatorial auctions, where bidders can bid on bundles of items are known to be desirable auction mechanisms for selling items that are complementary and/or substitutable. Howev...
Benoît Hudson, Tuomas Sandholm