Sciweavers

2488 search results - page 470 / 498
» An improvement in formal verification
Sort
View
CORR
2008
Springer
170views Education» more  CORR 2008»
15 years 1 months ago
To Broad-Match or Not to Broad-Match : An Auctioneer's Dilemma ?
We initiate the study of an interesting aspect of sponsored search advertising, namely the consequences of broad match- a feature where an ad of an advertiser can be mapped to a b...
Sudhir Kumar Singh, Vwani P. Roychowdhury
COMCOM
2006
154views more  COMCOM 2006»
15 years 1 months ago
Minimum-cost network hardening using attack graphs
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemin...
Lingyu Wang, Steven Noel, Sushil Jajodia
JCB
2007
144views more  JCB 2007»
15 years 1 months ago
Statistical Estimation of Statistical Mechanical Models: Helix-Coil Theory and Peptide Helicity Prediction
Analysis of biopolymer sequences and structures generally adopts one of two approaches: use of detailed biophysical theoretical models of the system with experimentally-determined...
Scott C. Schmidler, Joseph E. Lucas, Terrence G. O...
NECO
2007
150views more  NECO 2007»
15 years 24 days ago
Reinforcement Learning, Spike-Time-Dependent Plasticity, and the BCM Rule
Learning agents, whether natural or artificial, must update their internal parameters in order to improve their behavior over time. In reinforcement learning, this plasticity is ...
Dorit Baras, Ron Meir
CORR
2011
Springer
164views Education» more  CORR 2011»
14 years 4 months ago
Online Strategies for Intra and Inter Provider Service Migration in Virtual Networks
Network virtualization allows one to build dynamic distributed systems in which resources can be dynamically allocated at locations where they are most useful. In order to fully e...
Dushyant Arora, Marcin Bienkowski, Anja Feldmann, ...