Sciweavers

43264 search results - page 8110 / 8653
» Comparing models of computation
Sort
View
SAGT
2009
Springer
136views Game Theory» more  SAGT 2009»
15 years 11 months ago
Doing Good with Spam Is Hard
We study economic means to improve network performance in the well-known game theoretic traffic model due to Wardrop. We introduce two sorts of spam flow - auxiliary and adversari...
Martin Hoefer, Lars Olbrich, Alexander Skopalik
SARA
2009
Springer
15 years 11 months ago
A Practical Use of Imperfect Recall
Perfect recall is the common and natural assumption that an agent never forgets. As a consequence, the agent can always condition its choice of action on any prior observations. I...
Kevin Waugh, Martin Zinkevich, Michael Johanson, M...
CHIMIT
2009
ACM
15 years 11 months ago
Scripting practices in complex systems management
System administrators are end-users too. And as end-users, they develop tools, create web pages, write command-line scripts, use spreadsheets, and repurpose existing tools. In sho...
Eser Kandogan, Paul P. Maglio, Eben M. Haber, John...
IMC
2009
ACM
15 years 11 months ago
An analysis of packet sampling in the frequency domain
Packet sampling techniques introduce measurement errors that should be carefully handled in order to correctly characterize the network behavior. In the literature several works h...
Luigi Alfredo Grieco, Chadi Barakat
MM
2009
ACM
177views Multimedia» more  MM 2009»
15 years 11 months ago
Perceptual quality assessment based on visual attention analysis
Most existing quality metrics do not take the human attention analysis into account. Attention to particular objects or regions is an important attribute of human vision and perce...
Junyong You, Andrew Perkis, Miska M. Hannuksela, M...
« Prev « First page 8110 / 8653 Last » Next »