Sciweavers

6192 search results - page 1078 / 1239
» Distributed Control of Attention
Sort
View
131
Voted
CORR
2008
Springer
113views Education» more  CORR 2008»
15 years 3 months ago
Robustness, Risk, and Regularization in Support Vector Machines
We consider two new formulations for classification problems in the spirit of support vector machines based on robust optimization. Our formulations are designed to build in prote...
Huan Xu, Shie Mannor, Constantine Caramanis
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 3 months ago
Information Acquisition and Exploitation in Multichannel Wireless Networks
A wireless system with multiple channels is considered, where each channel has several transmission states. A user learns about the instantaneous state of an available channel by ...
Sudipto Guha, Kamesh Munagala, Saswati Sarkar
AHSWN
2006
148views more  AHSWN 2006»
15 years 3 months ago
Geometric Chemotaxis: A Biologically-Inspired Framework for a Class of Wireless Coverage Problems
Abstract-- We present a new, biologically-inspired algorithm for the problem of covering a given region with wireless "units" (sensors or base-stations). The general prob...
Hidayet Ozgur Sanli, Rahul Simha, Bhagirath Naraha...
ECEASST
2008
110views more  ECEASST 2008»
15 years 3 months ago
Independence Analysis of Firing and Rule-based Net Transformations in Reconfigurable Object Nets
: The main idea behind Reconfigurable Object Nets (RONs) is to support the visual specification of controlled rule-based net transformations of place/transition nets (P/T nets). RO...
Enrico Biermann, Tony Modica
ENTCS
2008
130views more  ENTCS 2008»
15 years 3 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
« Prev « First page 1078 / 1239 Last » Next »