Sciweavers

3820 search results - page 583 / 764
» Bounded Model Debugging
Sort
View
110
Voted
ACSAC
2010
IEEE
15 years 20 days ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
144
Voted
COLT
2010
Springer
15 years 20 days ago
Regret Minimization With Concept Drift
In standard online learning, the goal of the learner is to maintain an average loss that is "not too big" compared to the loss of the best-performing function in a fixed...
Koby Crammer, Yishay Mansour, Eyal Even-Dar, Jenni...
COLT
2010
Springer
15 years 20 days ago
Forest Density Estimation
We study graph estimation and density estimation in high dimensions, using a family of density estimators based on forest structured undirected graphical models. For density estim...
Anupam Gupta, John D. Lafferty, Han Liu, Larry A. ...
113
Voted
COMPIMAGE
2010
Springer
15 years 20 days ago
On the Effects of Normalization in Adaptive MRF Hierarchies
Abstract. In this paper, we analyze the effects of energy normalization in adaptivehierarchy-based energy minimization methods. Adaptive hierarchies provide a nt multi-level abstra...
Albert Y. C. Chen, Jason J. Corso
147
Voted
INFOCOM
2010
IEEE
15 years 17 days ago
On Computing Compression Trees for Data Collection in Wireless Sensor Networks
We address the problem of efficiently gathering correlated data from a wireless sensor network, with the aim of designing algorithms with provable optimality guarantees, and unders...
Jian Li, Amol Deshpande, Samir Khuller