Sciweavers

2028 search results - page 373 / 406
» Differential Power Analysis Model and Some Results
Sort
View
112
Voted
QUESTA
2010
131views more  QUESTA 2010»
15 years 5 days ago
Asymptotically optimal parallel resource assignment with interference
Motivated by scheduling in cellular wireless networks and resource allocation in computer systems, we study a service facility with two classes of users having heterogeneous servi...
Maaike Verloop, R. Núñez Queija
ICML
2009
IEEE
16 years 2 months ago
Near-Bayesian exploration in polynomial time
We consider the exploration/exploitation problem in reinforcement learning (RL). The Bayesian approach to model-based RL offers an elegant solution to this problem, by considering...
J. Zico Kolter, Andrew Y. Ng
ICRA
2005
IEEE
136views Robotics» more  ICRA 2005»
15 years 7 months ago
A Circular Needle Path Planning Method for Suturing in Laparoscopic Surgery
— The work presented in this paper addresses the problem of the stitching task in laparoscopic surgery using a circular needle and a conventional 4 DOFs needle-holder. This task ...
Florent Nageotte, Philippe Zanne, Michel de Mathel...
CIKM
2005
Springer
15 years 7 months ago
Novelty detection based on sentence level patterns
The detection of new information in a document stream is an important component of many potential applications. In this paper, a new novelty detection approach based on the identi...
Xiaoyan Li, W. Bruce Croft
132
Voted
CCS
2003
ACM
15 years 7 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu