Sciweavers

1690 search results - page 48 / 338
» Algorithmic Properties of Millstream Systems
Sort
View
152
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Bayesian reinforcement learning for POMDP-based dialogue systems
Spoken dialogue systems are gaining popularity with improvements in speech recognition technologies. Dialogue systems can be modeled effectively using POMDPs, achieving improvemen...
ShaoWei Png, Joelle Pineau
144
Voted
RTSS
2006
IEEE
15 years 9 months ago
Resource Sharing in EDF-Scheduled Systems: A Closer Look
Resource sharing in priority-based systems can give rise to priority-inversion and blocking, wherein a job’s execution is delayed because a lower-priority job holds some resourc...
Sanjoy K. Baruah
147
Voted
BERTINORO
2005
Springer
15 years 9 months ago
Multifaceted Simultaneous Load Balancing in DHT-Based P2P Systems: A New Game with Old Balls and Bins
In this paper we present and evaluate uncoordinated on-line algorithms for simultaneous storage and replication load-balancing in DHT-based peer-to-peer systems. We compare our ap...
Karl Aberer, Anwitaman Datta, Manfred Hauswirth
145
Voted
CODES
2005
IEEE
15 years 9 months ago
Microcoded coprocessor for embedded secure biometric authentication systems
We design and implement a cryptographic biometric authentication system using a microcoded architecture. The secure properties of the biometric matching process are obtained by me...
Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhe...
146
Voted
CCS
2010
ACM
15 years 2 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim