Results 1  10
of
331,750
Tight Bounds on the size of 2monopolies
, 1996
"... This paper deals with the question of the influence of a monopoly of vertices, seeking to gain the majority in local neighborhoods in a graph. Say that a vertex v is r controlled by a set of vertices M if the majority of its neighbors at distance r are from M . We ask how large must M be in orde ..."
Abstract

Cited by 12 (2 self)
 Add to MetaCart
be in order to rmonopolize the graph, namely, rcontrol every vertex. Tight upper and lower bounds are provided for this problem, establishing that in an nvertex graph, an rmonopoly M (for any even r 2) must be of size \Omega\Gamma n 3=5 ), and that for any r 2 there exist nvertex graphs with rmonopolies
CostAware WWW Proxy Caching Algorithms
 IN PROCEEDINGS OF THE 1997 USENIX SYMPOSIUM ON INTERNET TECHNOLOGY AND SYSTEMS
, 1997
"... Web caches can not only reduce network traffic and downloading latency, but can also affect the distribution of web traffic over the network through costaware caching. This paper introduces GreedyDualSize, which incorporates locality with cost and size concerns in a simple and nonparameterized fash ..."
Abstract

Cited by 544 (6 self)
 Add to MetaCart
Web caches can not only reduce network traffic and downloading latency, but can also affect the distribution of web traffic over the network through costaware caching. This paper introduces GreedyDualSize, which incorporates locality with cost and size concerns in a simple and non
Books in graphs
, 2008
"... A set of q triangles sharing a common edge is called a book of size q. We write β (n, m) for the the maximal q such that every graph G (n, m) contains a book of size q. In this note 1) we compute β ( n, cn 2) for infinitely many values of c with 1/4 < c < 1/3, 2) we show that if m ≥ (1/4 − α) ..."
Abstract

Cited by 2380 (22 self)
 Add to MetaCart
A set of q triangles sharing a common edge is called a book of size q. We write β (n, m) for the the maximal q such that every graph G (n, m) contains a book of size q. In this note 1) we compute β ( n, cn 2) for infinitely many values of c with 1/4 < c < 1/3, 2) we show that if m ≥ (1/4 − α
Symbolic Model Checking without BDDs
, 1999
"... Symbolic Model Checking [3, 14] has proven to be a powerful technique for the verification of reactive systems. BDDs [2] have traditionally been used as a symbolic representation of the system. In this paper we show how boolean decision procedures, like Stalmarck's Method [16] or the Davis ..."
Abstract

Cited by 910 (74 self)
 Add to MetaCart
Symbolic Model Checking [3, 14] has proven to be a powerful technique for the verification of reactive systems. BDDs [2] have traditionally been used as a symbolic representation of the system. In this paper we show how boolean decision procedures, like Stalmarck's Method [16] or the Davis
Monotone Complexity
, 1990
"... We give a general complexity classification scheme for monotone computation, including monotone spacebounded and Turing machine models not previously considered. We propose monotone complexity classes including mAC i , mNC i , mLOGCFL, mBWBP , mL, mNL, mP , mBPP and mNP . We define a simple ..."
Abstract

Cited by 2837 (11 self)
 Add to MetaCart
We give a general complexity classification scheme for monotone computation, including monotone spacebounded and Turing machine models not previously considered. We propose monotone complexity classes including mAC i , mNC i , mLOGCFL, mBWBP , mL, mNL, mP , mBPP and mNP . We define a
Boosting a Weak Learning Algorithm By Majority
, 1995
"... We present an algorithm for improving the accuracy of algorithms for learning binary concepts. The improvement is achieved by combining a large number of hypotheses, each of which is generated by training the given learning algorithm on a different set of examples. Our algorithm is based on ideas pr ..."
Abstract

Cited by 516 (15 self)
 Add to MetaCart
presented by Schapire in his paper "The strength of weak learnability", and represents an improvement over his results. The analysis of our algorithm provides general upper bounds on the resources required for learning in Valiant's polynomial PAC learning framework, which are the best general
Worstcase equilibria
 IN PROCEEDINGS OF THE 16TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE
, 1999
"... In a system in which noncooperative agents share a common resource, we propose the ratio between the worst possible Nash equilibrium and the social optimum as a measure of the effectiveness of the system. Deriving upper and lower bounds for this ratio in a model in which several agents share a ver ..."
Abstract

Cited by 851 (17 self)
 Add to MetaCart
In a system in which noncooperative agents share a common resource, we propose the ratio between the worst possible Nash equilibrium and the social optimum as a measure of the effectiveness of the system. Deriving upper and lower bounds for this ratio in a model in which several agents share a
A model of growth through creative destruction
, 1990
"... This paper develops a model based on Schumpeter's process of creative destruction. It departs from existing models of endogeneous growth in emphasizing obsolescence of old technologies induced by the accumulation of knowledge and the resulting process or industrial innovations. This has both ..."
Abstract

Cited by 1923 (29 self)
 Add to MetaCart
the log of GNP follows a random walk with drift. The size of the drift is the average growth rate of the economy and it is endogeneous to the model; in particular it depends on the size and likilihood of innovations resulting from research and also on the degree of market power available to an innovator.
Bid, ask and transaction prices in a specialist market with heterogeneously informed traders
 Journal of Financial Economics
, 1985
"... The presence of traders with superior information leads to a positive bidask spread even when the specialist is riskneutral and makes zero expected profits. The resulting transaction prices convey information, and the expectation of the average spread squared times volume is bounded by a number th ..."
Abstract

Cited by 1217 (5 self)
 Add to MetaCart
The presence of traders with superior information leads to a positive bidask spread even when the specialist is riskneutral and makes zero expected profits. The resulting transaction prices convey information, and the expectation of the average spread squared times volume is bounded by a number
Geographic Concentration in U.S. Manufacturing Industries: A Dartboard Approach
 Journal of Political Economy
"... This paper discusses the prevalence of Silicon Valley–style localizations of individual manufacturing industries in the United States. A model in which localized industryspecific spillovers, natural advantages, and pure random chance all contribute to geographic concentration is used to develop a ..."
Abstract

Cited by 573 (16 self)
 Add to MetaCart
a test for whether observed levels of concentration are greater than would be expected to arise randomly and to motivate new indices of geographic concentration and of coagglomeration. The proposed indices control for differences in the size distribution of plants and for differences in the size
Results 1  10
of
331,750