Sciweavers

424 search results - page 53 / 85
» Balanced Incomplete Factorization
Sort
View
CACM
1999
92views more  CACM 1999»
15 years 1 months ago
Putting OO Distributed Programming to Work
stractions underlying distributed computing. We attempted to keep our preaims at an abstract and general level. In this column, we make those claims more concrete. More precisely, ...
Pascal Felber, Rachid Guerraoui, Mohamed Fayad
JAIR
2002
122views more  JAIR 2002»
15 years 1 months ago
Competitive Safety Analysis: Robust Decision-Making in Multi-Agent Systems
Much work in AI deals with the selection of proper actions in a given (known or unknown) environment. However, the way to select a proper action when facing other agents is quite ...
Moshe Tennenholtz
KDD
2012
ACM
201views Data Mining» more  KDD 2012»
13 years 4 months ago
Low rank modeling of signed networks
Trust networks, where people leave trust and distrust feedback, are becoming increasingly common. These networks may be regarded as signed graphs, where a positive edge weight cap...
Cho-Jui Hsieh, Kai-Yang Chiang, Inderjit S. Dhillo...
ICCV
2009
IEEE
16 years 7 months ago
Level Set Segmentation with Both Shape and Intensity Priors
We present a new variational level-set-based segmentation formulation that uses both shape and intensity prior information learned from a training set. By applying Bayes’ rule...
Siqi Chen and Richard J. Radke
WWW
2006
ACM
16 years 2 months ago
Designing ethical phishing experiments: a study of (ROT13) rOnl query features
We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an e...
Markus Jakobsson, Jacob Ratkiewicz