Sciweavers

2242 search results - page 129 / 449
» Using Simulation in Call Centers
Sort
View
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 5 months ago
Efficient closed pattern mining in the presence of tough block constraints
In recent years, various constrained frequent pattern mining problem formulations and associated algorithms have been developed that enable the user to specify various itemsetbase...
Krishna Gade, Jianyong Wang, George Karypis
CHI
2007
ACM
16 years 5 months ago
Work-centered design: a case study of a mixed-initiative scheduler
We present the case study of a complex, mixed-initiative scheduling system to illustrate Work-Centered Design (WCD), a new approach for the design of information systems. WCD is b...
Keith A. Butler, Jiajie Zhang, Chris Esposito, Ali...
SAC
2003
ACM
15 years 10 months ago
Greedy Heuristics and an Evolutionary Algorithm for the Bounded-Diameter Minimum Spanning Tree Problem
Given a connected, weighted, undirected graph G and a bound D, the bounded-diameter minimum spanning tree problem seeks a spanning tree on G of lowest weight in which no path betw...
Günther R. Raidl, Bryant A. Julstrom
TSMC
2002
105views more  TSMC 2002»
15 years 4 months ago
V-Lab-a virtual laboratory for autonomous agents-SLA-based learning controllers
In this paper, we present the use of stochastic learning automata (SLA) in mutliagent robotics. In order to fully utilize and implement learning control algorithms in the control o...
Aly I. El-Osery, John Burge, Mohammad Jamshidi, An...
MSS
2000
IEEE
69views Hardware» more  MSS 2000»
15 years 9 months ago
Evaluating Backup Algorithms
We present a trace-driven simulator that evaluates the performance of backup algorithms. We use this simulator to compare the performance of the commonly-used level scheme (our na...
Zachary Kurmas, Ann L. Chervenak