Sciweavers

1897 search results - page 318 / 380
» Conditional Linear Planning
Sort
View
JCO
2006
67views more  JCO 2006»
15 years 21 days ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
101
Voted
ECCC
2007
62views more  ECCC 2007»
15 years 20 days ago
Space Hierarchy Results for Randomized and Other Semantic Models
We prove space hierarchy and separation results for randomized and other semantic models of computation with advice where a machine is only required to behave appropriately when g...
Jeff Kinne, Dieter van Melkebeek
85
Voted
JSAC
2006
70views more  JSAC 2006»
15 years 20 days ago
Throughput-range tradeoff of wireless mesh backhaul networks
Wireless backhaul communication is expected to play a significant role in providing the necessary backhaul resources for future high-rate wireless networks. Mesh networking, in whi...
H. Viswanathan, S. Mukherjee
NECO
2008
101views more  NECO 2008»
15 years 20 days ago
On the Classification Capability of Sign-Constrained Perceptrons
The perceptron (also referred to as McCulloch-Pitts neuron, or linear threshold gate) is commonly used as a simplified model for the discrimination and learning capability of a bi...
Robert A. Legenstein, Wolfgang Maass
96
Voted
MOR
2006
81views more  MOR 2006»
15 years 20 days ago
Simulated Annealing for Convex Optimization
We apply the method known as simulated annealing to the following problem in convex optimization: minimize a linear function over an arbitrary convex set, where the convex set is ...
Adam Tauman Kalai, Santosh Vempala