Sciweavers

9359 search results - page 50 / 1872
» Generalization Algorithms for Second-Order Terms
Sort
View
ANCS
2010
ACM
15 years 1 months ago
A traffic-aware top-N firewall ruleset approximation algorithm
Packet classification is widely used in various network security and operation applications. Two of the main challenges are the increasing number of classification rules, amount o...
Ho-Yu Lam, Donghan (Jarod) Wang, H. Jonathan Chao
146
Voted
INFOCOM
2000
IEEE
15 years 8 months ago
Efficient Handoff Rerouting Algorithms: A Competitive On-Line Algorithmic Approach
—This paper considers the design of handoff rerouting algorithms for reducing the overall session cost in personal communication systems (PCS). Most modern communication systems ...
Yigal Bejerano, Israel Cidon, Joseph Naor
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 4 months ago
Differential privacy and robust statistics
We show by means of several examples that robust statistical estimators present an excellent starting point for differentially private estimators. Our algorithms use a new paradig...
Cynthia Dwork, Jing Lei
187
Voted
CSCW
2012
ACM
13 years 11 months ago
Recommending routes in the context of bicycling: algorithms, evaluation, and the value of personalization
Users have come to rely on automated route finding services for driving, public transit, walking, and bicycling. Current state of the art route finding algorithms typically rely...
Reid Priedhorsky, David Pitchford, Shilad Sen, Lor...
GECCO
2007
Springer
532views Optimization» more  GECCO 2007»
15 years 9 months ago
Evolving evolutionary algorithms using evolutionary algorithms
A new model for automatic generation of Evolutionary Algorithms (EAs) by evolutionary means is proposed in this paper. The model is based on a simple Genetic Algorithm (GA). Every...
Laura Diosan, Mihai Oltean