Sciweavers

3731 search results - page 598 / 747
» cases 2006
Sort
View
76
Voted
CORR
2010
Springer
66views Education» more  CORR 2010»
15 years 26 days ago
On Extractors and Exposure-Resilient Functions for Sublogarithmic Entropy
We study deterministic extractors for bit-fixing sources (a.k.a. resilient functions) and exposure-resilient functions for small min-entropy. That is, of the n bits given as input...
Yakir Reshef, Salil P. Vadhan
111
Voted
COMCOM
2008
154views more  COMCOM 2008»
15 years 26 days ago
Analysis of hybrid P2P overlay network topology
Modeling peer-to-peer (P2P) networks is a challenge for P2P researchers. In this paper, we provide a detailed analysis of large-scale hybrid P2P overlay network topology, using Gn...
Chao Xie, Guihai Chen, Art Vandenberg, Yi Pan
COR
2008
66views more  COR 2008»
15 years 26 days ago
A multi-objective model for environmental investment decision making
Investment in landscapes to achieve outcomes that have multiple environmental benefits has become a major priority in many countries. This gives rise to opportunities for mathemat...
Andrew J. Higgins, Stefan Hajkowicz, Elisabeth N. ...
AAMAS
2006
Springer
15 years 26 days ago
TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources
In many dynamic open systems, agents have to interact with one another to achieve their goals. Here, agents may be self-interested and when trusted to perform an action for another...
W. T. Luke Teacy, Jigar Patel, Nicholas R. Jenning...
ACTA
2006
104views more  ACTA 2006»
15 years 25 days ago
Safe projections of binary data sets
Abstract Selectivity estimation of a boolean query based on frequent itemsets can be solved by describing the problem by a linear program. However, the number of variables in the e...
Nikolaj Tatti