Sciweavers

445 search results - page 81 / 89
» Recco: recombination analysis using cost optimization
Sort
View
EMS
2008
IEEE
14 years 11 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
AAAI
2010
14 years 11 months ago
Decision-Theoretic Control of Crowd-Sourced Workflows
Crowd-sourcing is a recent framework in which human intelligence tasks are outsourced to a crowd of unknown people ("workers") as an open call (e.g., on Amazon's Me...
Peng Dai, Mausam, Daniel S. Weld
DATAMINE
2010
175views more  DATAMINE 2010»
14 years 10 months ago
Extracting influential nodes on a social network for information diffusion
We address the combinatorial optimization problem of finding the most influential nodes on a large-scale social network for two widely-used fundamental stochastic diffusion models...
Masahiro Kimura, Kazumi Saito, Ryohei Nakano, Hiro...
JUCS
2006
128views more  JUCS 2006»
14 years 9 months ago
A Web-Based Decision Support System for Chronic Diseases
: Individuals vary in survival chances due to differences in genetics, environmental exposures, and gene-environment interactions. These chances, as well as the contribution of eac...
Chi-Chan Chang, Chuen-Sheng Cheng, Yeu-Shiang Huan...
JSAC
2007
104views more  JSAC 2007»
14 years 9 months ago
Price dynamics in competitive agile spectrum access markets
— We explore the price dynamics in a competitive market consisting of spectrum agile network service providers and users. Here, multiple self interested spectrum providers operat...
Yiping Xing, Rajarathnam Chandramouli, Carlos de M...