Sciweavers

7978 search results - page 1412 / 1596
» Combining shared-coin algorithms
Sort
View
DIMVA
2007
15 years 5 months ago
On the Adaptive Real-Time Detection of Fast-Propagating Network Worms
Abstract. We present two light-weight worm detection algorithms that offer significant advantages over fixed-threshold methods. The first algorithm, RBS (ratebased sequential hy...
Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson
LREC
2010
141views Education» more  LREC 2010»
15 years 5 months ago
Exploring Knowledge Bases for Similarity
Graph-based similarity over WordNet has been previously shown to perform very well on word similarity. This paper presents a study of the performance of such a graph-based algorit...
Eneko Agirre, Montse Cuadros, German Rigau, Aitor ...
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
15 years 5 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan
AAAI
1997
15 years 5 months ago
Model Minimization in Markov Decision Processes
Many stochastic planning problems can be represented using Markov Decision Processes (MDPs). A difficulty with using these MDP representations is that the common algorithms for so...
Thomas Dean, Robert Givan
AAAI
1994
15 years 5 months ago
Learning to Reason
We introduce a new framework for the study of reasoning. The Learning (in order) to Reason approach developed here views learning as an integral part of the inference process, and ...
Roni Khardon, Dan Roth
« Prev « First page 1412 / 1596 Last » Next »