In: Annual Review of Immunology
P. falciparum remains a serious public health problem and a continuous challenge for the immune system due to the complexity and diversity of the pathogen. Recent advances from several laboratories in the characterization of the antibody response to the parasite have led to the identification of critical targets for protection and revealed a new mechanism of diversification based on the...
|
An efficient fork/join application should maximize parallelism while minimizing overheads, and maximize locality while minimizing contention. However, there is no unique optimal implementation that best resolves such tradeoffs and failing in balancing them may lead to fork/join applications suffering from several issues (e.g., suboptimal forking, load imbalance, excessive synchronization),...
|
In: Proceedings of the Web Conference (WWW 2019)
|
In: Proceedings of the Web Conference (WWW 2019)
|
In: Proceedings of the Web Conference (WWW 2019)
|
|
In: International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019
|
In: AAAI Conference on Human Computation and Crowdsourcing (HCOMP), 2018
Crowdworker online communities -- operating in fora like mTurkForum and TurkerNation -- are an important actor in microwork markets. Albeit central to market dynamics, how the behavior of crowdworker communities and the dynamics of online marketplaces influence each other is yet to be understood. To provide quantitative evidence of such influence, we performed an analysis on 6-years worth of...
|
In: AAAI 2018: Conference on Artificial Intelligence; New Orleans, Louisiana, USA
|
In: Proceedings of the AAAI Conference on Artificial Intelligence (AAAI'18), New Orleans, USA
For real-world mobile applications such as location-based advertising and spatial crowdsourcing, a key to success is targeting mobile users that can maximally cover certain locations in a future period. To find an optimal group of users, existing methods often require information about users' mobility history, which may cause privacy breaches. In this paper, we propose a method to maximize...
|