Sciweavers

1042 search results - page 135 / 209
» Representing real numbers in a generalized numeration system
Sort
View
NOSSDAV
2004
Springer
15 years 6 months ago
Connectivity restrictions in overlay multicast
A large number of overlay multicast protocols have been developed, almost all of which assume universal connectivity between end hosts. However, in reality, this assumption is not...
Aditya Ganjam, Hui Zhang
IWCMC
2010
ACM
15 years 1 months ago
Policy-driven workflows for mobile network management automation
Future wireless networks will experience a continuous growth regarding the number of network elements with increasingly complex interrelations between the configuration of multipl...
Raphael Romeikat, Bernhard Bauer, Tobias Bandh, Ge...
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
15 years 5 months ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma
SIGCSE
2009
ACM
132views Education» more  SIGCSE 2009»
16 years 2 months ago
Retina: helping students and instructors based on observed programming activities
It is difficult for instructors of CS1 and CS2 courses to get accurate answers to such critical questions as "how long are students spending on programming assignments?"...
Christian Murphy, Gail E. Kaiser, Kristin Loveland...
WINE
2009
Springer
182views Economy» more  WINE 2009»
15 years 8 months ago
Competitive Repeated Allocation without Payments
We study the problem of allocating a single item repeatedly among multiple competing agents, in an environment where monetary transfers are not possible. We design (Bayes-Nash) inc...
Mingyu Guo, Vincent Conitzer, Daniel M. Reeves