Sciweavers

13 search results - page 1 / 3
» Online Optimization Under Adversarial Perturbations
Sort
View
JMLR
2010
198views more  JMLR 2010»
12 years 11 months ago
Online Anomaly Detection under Adversarial Impact
Security analysis of learning algorithms is gaining increasing importance, especially since they have become target of deliberate obstruction in certain applications. Some securit...
Marius Kloft, Pavel Laskov
SODA
2012
ACM
240views Algorithms» more  SODA 2012»
11 years 7 months ago
Simultaneous approximations for adversarial and stochastic online budgeted allocation
Motivated by online ad allocation, we study the problem of simultaneous approximations for the adversarial and stochastic online budgeted allocation problem. This problem consists...
Vahab S. Mirrokni, Shayan Oveis Gharan, Morteza Za...
DEDS
2010
130views more  DEDS 2010»
13 years 5 months ago
Message Batching in Wireless Sensor Networks - A Perturbation Analysis Approach
Abstract-- We address the problem of batching messages generated at nodes of a sensor network for the purpose of reducing communication energy at the expense of added latency. We f...
Xu Ning, Christos G. Cassandras
CDC
2009
IEEE
110views Control Systems» more  CDC 2009»
13 years 2 months ago
Perturbation analysis and optimization of multiclass multiobjective Stochastic Flow Models
Stochastic Flow Models (SFMs) are stochastic ystems that abstract the dynamics of complex discrete event systems involving the control of sharable resources. SFMs have been used to...
Chen Yao, Christos G. Cassandras
SPAA
2004
ACM
13 years 10 months ago
Fighting against two adversaries: page migration in dynamic networks
Page migration is one of the fundamental subproblems in the framework of data management in networks. It occurs in a distributed network of processors sharing one indivisible memo...
Marcin Bienkowski, Miroslaw Korzeniowski, Friedhel...