Sciweavers

4815 search results - page 717 / 963
» A Pattern Approach to Modeling the Provider Selection Proble...
Sort
View
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 1 months ago
The Non-Bayesian Restless Multi-Armed Bandit: a Case of Near-Logarithmic Regret
In the classic Bayesian restless multi-armed bandit (RMAB) problem, there are N arms, with rewards on all arms evolving at each time as Markov chains with known parameters. A play...
Wenhan Dai, Yi Gai, Bhaskar Krishnamachari, Qing Z...
ITCC
2005
IEEE
15 years 10 months ago
A Web Recommendation System Based on Maximum Entropy
We propose a Web recommendation system based on a maximum entropy model. Under the maximum entropy principle, we can combine multiple levels of knowledge about users’ navigation...
Xin Jin, Bamshad Mobasher, Yanzan Zhou
CSFW
2009
IEEE
15 years 8 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
JCNS
2008
117views more  JCNS 2008»
15 years 4 months ago
Dendritic action potentials connect distributed dendrodendritic microcircuits
Lateral inhibition of cells surrounding an excited area is a key property of sensory systems, sharpening the preferential tuning of individual cells in the presence of closely rela...
Michele Migliore, Gordon M. Shepherd
WISTP
2010
Springer
15 years 11 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...