• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 21 - 30 of 513
Next 10 →

Greedy online histograms applied to deterministic sampling

by Joannès Vermorel, Hervé Brönnimann , 2003
"... ..."
Abstract - Add to MetaCart
Abstract not found

On the Performance of Greedy Algorithms in Packet Buffering

by Susanne Albersy, Markus Schmidtz
"... We study a basic buffer management problem that arises in network switches. Consider m input ports, each of which is equipped with a buffer (queue) of limited capacity. Data packets arrive online and can be stored in the buffers if space permits; otherwise packet loss occurs. In each time step the s ..."
Abstract - Add to MetaCart
for deterministic and randomized online algorithms. In the second part of the paper we present the first deterministic online algorithm that is better than 2-competitive. We develop a modified greedy algorithm, called Semi-Greedy, and prove that it achieves a competitive ratio of 17=9 1:89. The new algorithm

On the performance of greedy algorithms for energy minimization

by Anne Benoit, Paul Renaud-goud, Yves Robert , 2010
"... We revisit the well-known greedy algorithm for scheduling independent jobs on parallel processors, with the objective of energy minimization. We assess the performance of the online version, as well as the performance of the offline version, which sorts the jobs by nonincreasing size before executio ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
We revisit the well-known greedy algorithm for scheduling independent jobs on parallel processors, with the objective of energy minimization. We assess the performance of the online version, as well as the performance of the offline version, which sorts the jobs by nonincreasing size before

The Fractional Greedy Algorithm for Data Compression

by József Bekesi, Gábor Galambos, Ulrich Pferschy, Gerhard J. Woeginger
"... Text-compression problems are considered where substrings are substituted by code-- words according to a static dictionary such that the original text is encoded by a shorter code sequence. We introduce a new efficient on-line heuristic which locally maximizes the compaction ratio. The worst-case be ..."
Abstract - Add to MetaCart
Text-compression problems are considered where substrings are substituted by code-- words according to a static dictionary such that the original text is encoded by a shorter code sequence. We introduce a new efficient on-line heuristic which locally maximizes the compaction ratio. The worst

Scalable Influence Maximization for Prevalent Viral Marketing in Large-Scale Social Networks

by Wei Chen, Chi Wang, Yajun Wang
"... Influence maximization, defined by Kempe, Kleinberg, and Tardos (2003), is the problem of finding a small set of seed nodes in a social network that maximizes the spread of influence under certain influence cascade models. The scalability of influence maximization is a key factor for enabling preval ..."
Abstract - Cited by 183 (14 self) - Add to MetaCart
prevalent viral marketing in largescale online social networks. Prior solutions, such as the greedy algorithm of Kempe et al. (2003) and its improvements are slow and not scalable, while other heuristic algorithms do not provide consistently good performance on influence spreads. In this paper, we design a

On-line load balancing made simple: Greedy strikes back

by Pilu Crescenzi, Giorgio Gambosi, Gaia Nicosia, Paolo Penna, Walter Unger - Journal of Discrete Algorithms , 2003
"... We provide a new simpler approach to the on-line load balancing problem in the case of restricted assignment of temporary weighted tasks. The approach is very general and allows to derive on-line distributed algorithms whose competitive ratio is characterized by some combinatorial properties of the ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
We provide a new simpler approach to the on-line load balancing problem in the case of restricted assignment of temporary weighted tasks. The approach is very general and allows to derive on-line distributed algorithms whose competitive ratio is characterized by some combinatorial properties

Greedy Algorithms for on-Line Set-Covering and Related Problems

by Giorgio Ausiello, Aristotelis Giannakos, Vangelis Th. Paschos , 2006
"... We study the following on-line model for set-covering: elements of a ground set of size n arrive one-by-one and with any such element c i , arrives also the name of some set S i 0 containing c i and covering the most of the uncovered ground set-elements (obviously, these elements have not been yet r ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
revealed). For this model we analyze a simple greedy algorithm consisting of taking S i 0 into the cover, only if c i is not already covered. We prove that the competitive ratio of this algorithm is # n and that it is asymptotically optimal for the model dealt, since no on-line algorithm can do n/2. We

CINEMA: Conformity-Aware Greedy Algorithm for Influence Maximization in Online Social Networks

by Hui Li, Sourav S Bhowmick, Aixin Sun , 2013
"... Influence maximization (im) is the problem of finding a small subset of nodes (seed nodes) in a social network that could maximize the spread of influence. Despite the progress achieved by state-of-the-art greedyim techniques, they suffer from two key limitations. Firstly, they are inefficient as th ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
Influence maximization (im) is the problem of finding a small subset of nodes (seed nodes) in a social network that could maximize the spread of influence. Despite the progress achieved by state-of-the-art greedyim techniques, they suffer from two key limitations. Firstly, they are inefficient as they can take days to find seeds in very large real-world networks. Secondly, although extensive research in social psychology suggests that humans will readily conform to the wishes or beliefs of others, surprisingly, existingim techniques are conformity-unaware. That is, they only utilize an individual’s ability to influence another but ignores conformity (a person’s inclination to be influenced) of the individuals. In this paper, we propose a novel conformity-aware cascade (c 2) model which leverages on the interplay between influence and conformity in obtaining the influence probabilities of nodes from underlying

Extending Greedy Multicast Routing to Delay Sensitive Applications

by Ashish Goel, Kameshwar Munagala , 1999
"... Given a weighted undirected graph G(V; E) and a subset R of V , a Steiner tree is a subtree of G that contains each vertex in R. In this paper, we present an online algorithm for nding a Steiner tree that simultaneously approximates the shortest path tree and the minimum weight Steiner tree, when ..."
Abstract - Cited by 11 (2 self) - Add to MetaCart
Given a weighted undirected graph G(V; E) and a subset R of V , a Steiner tree is a subtree of G that contains each vertex in R. In this paper, we present an online algorithm for nding a Steiner tree that simultaneously approximates the shortest path tree and the minimum weight Steiner tree

Learning Transition Dynamics in MDPs with Online Regression and Greedy Feature Selection∗

by Guy Lever, Ronnie Stafford, John Shawe-taylor
"... We present an approach to reinforcement learning in which the system dynamics are modelled using online linear regression between feature spaces, and a compact feature representation for the dynamics model is built incrementally using greedy feature selection. Candidate features are built online usi ..."
Abstract - Add to MetaCart
We present an approach to reinforcement learning in which the system dynamics are modelled using online linear regression between feature spaces, and a compact feature representation for the dynamics model is built incrementally using greedy feature selection. Candidate features are built online
Next 10 →
Results 21 - 30 of 513
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University