Sciweavers

7106 search results - page 1240 / 1422
» Restricted Complexity, General Complexity
Sort
View
125
Voted
CAV
2009
Springer
206views Hardware» more  CAV 2009»
16 years 5 months ago
D-Finder: A Tool for Compositional Deadlock Detection and Verification
D-Finder tool implements a compositional method for the verification of component-based systems described in BIP language encompassing multi-party interaction. For deadlock detecti...
Saddek Bensalem, Marius Bozga, Thanh-Hung Nguyen, ...
KDD
2009
ACM
192views Data Mining» more  KDD 2009»
16 years 5 months ago
Learning optimal ranking with tensor factorization for tag recommendation
Tag recommendation is the task of predicting a personalized list of tags for a user given an item. This is important for many websites with tagging capabilities like last.fm or de...
Steffen Rendle, Leandro Balby Marinho, Alexandros ...
144
Voted
KDD
2009
ACM
152views Data Mining» more  KDD 2009»
16 years 5 months ago
A multi-relational approach to spatial classification
Spatial classification is the task of learning models to predict class labels based on the features of entities as well as the spatial relationships to other entities and their fe...
Richard Frank, Martin Ester, Arno Knobbe
140
Voted
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
16 years 5 months ago
Efficient influence maximization in social networks
Influence maximization is the problem of finding a small subset of nodes (seed nodes) in a social network that could maximize the spread of influence. In this paper, we study the ...
Wei Chen, Yajun Wang, Siyu Yang
KDD
2009
ACM
168views Data Mining» more  KDD 2009»
16 years 5 months ago
Sustainable operation and management of data center chillers using temporal data mining
Motivation: Data centers are a critical component of modern IT infrastructure but are also among the worst environmental offenders through their increasing energy usage and the re...
Debprakash Patnaik, Manish Marwah, Ratnesh K. Shar...
« Prev « First page 1240 / 1422 Last » Next »