Sciweavers

1583 search results - page 194 / 317
» Continuous Optimization
Sort
View
VLDB
2002
ACM
135views Database» more  VLDB 2002»
15 years 3 months ago
Monitoring Streams - A New Class of Data Management Applications
This paper introduces monitoring applications, which we will show differ substantially from conventional business data processing. The fact that a software system must process and...
Donald Carney, Ugur Çetintemel, Mitch Chern...
166
Voted
JSAC
2008
95views more  JSAC 2008»
15 years 2 months ago
Cognitive Medium Access: Constraining Interference Based on Experimental Models
In this paper we design a cognitive radio that can coexist with multiple parallel WLAN channels while abiding by an interference constraint. The interaction between both systems is...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
AAMAS
2011
Springer
14 years 10 months ago
Long-term fairness with bounded worst-case losses
How does one repeatedly choose actions so as to be fairest to the multiple beneficiaries of those actions? We examine approaches to discovering sequences of actions for which the...
Gabriel Catalin Balan, Dana Richards, Sean Luke
168
Voted
CDC
2010
IEEE
144views Control Systems» more  CDC 2010»
14 years 10 months ago
Semiparametric identification of Hammerstein systems using input reconstruction and a single harmonic input
We present a two-step method for identifying SISO Hammerstein systems. First, using a persistent input with retrospective cost optimization, we estimate a parametric model of the l...
Anthony M. D'Amato, Kenny S. Mitchell, Bruno Ot&aa...
125
Voted
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 10 months ago
A Secure Communication Game with a Relay Helping the Eavesdropper
—In this work a four terminal Gaussian network composed of a source, a destination, an eavesdropper and a jammer relay is studied. The jammer relay does not hear the source trans...
Melda Yuksel, Xi Liu, Elza Erkip