Sciweavers

5948 search results - page 959 / 1190
» Computing Robust Counter-Strategies
Sort
View
CONEXT
2009
ACM
15 years 5 months ago
ThunderDome: discovering upload constraints using decentralized bandwidth tournaments
ThunderDome is a system for collaboratively measuring upload bandwidths in ad-hoc peer-to-peer systems. It works by scheduling bandwidth probes between pairs of hosts, wherein eac...
John R. Douceur, James W. Mickens, Thomas Moscibro...
GECCO
2008
Springer
147views Optimization» more  GECCO 2008»
15 years 5 months ago
On selecting the best individual in noisy environments
In evolutionary algorithms, the typical post-processing phase involves selection of the best-of-run individual, which becomes the final outcome of the evolutionary run. Trivial f...
Wojciech Jaskowski, Wojciech Kotlowski
ICML
2010
IEEE
15 years 5 months ago
A scalable trust-region algorithm with application to mixed-norm regression
We present a new algorithm for minimizing a convex loss-function subject to regularization. Our framework applies to numerous problems in machine learning and statistics; notably,...
Dongmin Kim, Suvrit Sra, Inderjit S. Dhillon
SIGCOMM
2010
ACM
15 years 4 months ago
Autonomous traffic engineering with self-configuring topologies
Network operators use traffic engineering (TE) to control the flow of traffic across their networks. Existing TE methods require manual configuration of link weights or tunnels, w...
Srikanth Sundaresan, Cristian Lumezanu, Nick Feams...
ICASSP
2010
IEEE
15 years 4 months ago
A novel watermarking scheme with compensation in bit-stream domain for H.264/AVC
Currently, most of the watermarking algorithms for H.264/AVC video coding standard are encoder-based due to their high perceptual quality. However, for the compressed video, they ...
Liwei Zhang, Yuesheng Zhu, Lai-Man Po