Sciweavers

455 search results - page 63 / 91
» Social search and discovery using a unified approach
Sort
View
CPAIOR
2008
Springer
15 years 3 months ago
Connections in Networks: A Hybrid Approach
This paper extends our previous work by exploring the use of a hybrid solution method for solving the connection subgraph problem. We employ a two phase solution method, which dras...
Carla P. Gomes, Willem Jan van Hoeve, Ashish Sabha...
JNW
2008
164views more  JNW 2008»
15 years 1 months ago
Improving Multi-Agent Based Resource Coordination in Peer-to-Peer Networks
The distributed nature of peer-to-peer networks offers a solid ground for the deployment of environments where multiple agents, managing several resources, can cooperate in pursuin...
António Luis Lopes, Luís Miguel Bote...
UAI
2008
15 years 3 months ago
Discovering Cyclic Causal Models by Independent Components Analysis
We generalize Shimizu et al's (2006) ICA-based approach for discovering linear non-Gaussian acyclic (LiNGAM) Structural Equation Models (SEMs) from causally sufficient, conti...
Gustavo Lacerda, Peter Spirtes, Joseph Ramsey, Pat...
NDSS
2007
IEEE
15 years 8 months ago
Fig: Automatic Fingerprint Generation
Fingerprinting is a widely used technique among the networking and security communities for identifying different implementations of the same piece of networking software running ...
Shobha Venkataraman, Juan Caballero, Pongsin Poosa...
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
15 years 1 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...