Sciweavers

1414 search results - page 150 / 283
» Combining Intruder Theories
Sort
View
87
Voted
IPL
2006
88views more  IPL 2006»
15 years 1 months ago
A note on the attractor-property of infinite-state Markov chains
In the past 5 years, a series of verification algorithms has been proposed for infinite Markov chains that have a finite attractor, i.e., a set that will be visited infinitely oft...
Christel Baier, Nathalie Bertrand, Ph. Schnoebelen
126
Voted
DSP
2007
15 years 1 months ago
Knowledge based adaptive processing for ground moving target indication
This paper presents a preliminary knowledge based approach to Space-Time Adaptive Processing (STAP) for ground moving target indication from an airborne platform. The KB-processor...
Raviraj Adve, Todd Hale, Michael C. Wicks
149
Voted
EC
2007
167views ECommerce» more  EC 2007»
15 years 1 months ago
Comparison-Based Algorithms Are Robust and Randomized Algorithms Are Anytime
Randomized search heuristics (e.g., evolutionary algorithms, simulated annealing etc.) are very appealing to practitioners, they are easy to implement and usually provide good per...
Sylvain Gelly, Sylvie Ruette, Olivier Teytaud
KES
2008
Springer
15 years 1 months ago
Information Coordination Using Meta-agents in Information Logistics Processes
In order to coordinate and deliver information in the right time and to the right place, theories from multi-agent systems and information logistics are combined. We use agents to ...
Mats Apelkrans, Anne Håkansson
JMLR
2006
107views more  JMLR 2006»
15 years 1 months ago
Consistency of Multiclass Empirical Risk Minimization Methods Based on Convex Loss
The consistency of classification algorithm plays a central role in statistical learning theory. A consistent algorithm guarantees us that taking more samples essentially suffices...
Di-Rong Chen, Tao Sun