Sciweavers

8068 search results - page 1364 / 1614
» Java Data Objects
Sort
View
136
Voted
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
14 years 9 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
139
Voted
WSDM
2012
ACM
259views Data Mining» more  WSDM 2012»
13 years 11 months ago
Learning recommender systems with adaptive regularization
Many factorization models like matrix or tensor factorization have been proposed for the important application of recommender systems. The success of such factorization models dep...
Steffen Rendle
JMLR
2012
13 years 5 months ago
Noise-Contrastive Estimation of Unnormalized Statistical Models, with Applications to Natural Image Statistics
We consider the task of estimating, from observed data, a probabilistic model that is parameterized by a finite number of parameters. In particular, we are considering the situat...
Michael Gutmann, Aapo Hyvärinen
KDD
2012
ACM
190views Data Mining» more  KDD 2012»
13 years 5 months ago
Multi-label hypothesis reuse
Multi-label learning arises in many real-world tasks where an object is naturally associated with multiple concepts. It is well-accepted that, in order to achieve a good performan...
Sheng-Jun Huang, Yang Yu, Zhi-Hua Zhou
176
Voted

Publication
158views
17 years 1 months ago
Fair Flow Control for ATM-ABR Multipoint Connections
Multipoint-to-multipoint communication can be implemented by combining the point-to-multipoint and multipoint-to-point connection algorithms. In an ATM multipoint-to-point connecti...
Sonia Fahmy, Raj Jain, Rohit Goyal, and Bobby Vand...
« Prev « First page 1364 / 1614 Last » Next »