Sciweavers

7930 search results - page 1395 / 1586
» Greedy in Approximation Algorithms
Sort
View
AINA
2007
IEEE
15 years 10 months ago
Fuzzy Logic-Based Event Notification in Sparse MANETs
In the Ad-Hoc InfoWare project, we develop a delay tolerant event notification service for sparse Mobile Ad-Hoc Networks for emergency and rescue operations. In most event notific...
Anna K. Lekova, Katrine Stemland Skjelsvik, Thomas...
FOCI
2007
IEEE
15 years 10 months ago
Almost All Learning Machines are Singular
— A learning machine is called singular if its Fisher information matrix is singular. Almost all learning machines used in information processing are singular, for example, layer...
Sumio Watanabe
FOCS
2007
IEEE
15 years 10 months ago
Mechanism Design via Differential Privacy
We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic age...
Frank McSherry, Kunal Talwar
HICSS
2007
IEEE
138views Biometrics» more  HICSS 2007»
15 years 10 months ago
A Probabilistic Graphical Approach to Computing Electricity Price Duration Curves under Price and Quantity Competition
Abstract— The electricity price duration curve (EPDC) represents the probability distribution function of the electricity price considered as a random variable. The price uncerta...
Pascal Michaillat, Shmuel S. Oren
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 10 months ago
Accurate Classification of the Internet Traffic Based on the SVM Method
—The need to quickly and accurately classify Internet traffic for security and QoS control has been increasing significantly with the growing Internet traffic and applications ov...
Zhu Li, Ruixi Yuan, Xiaohong Guan
« Prev « First page 1395 / 1586 Last » Next »