Sciweavers

2924 search results - page 199 / 585
» Lower Bounds in Distributed Computing
Sort
View
122
Voted
FOCS
1995
IEEE
15 years 6 months ago
Tracking the Best Disjunction
Abstract. Littlestone developed a simple deterministic on-line learning algorithm for learning k-literal disjunctions. This algorithm (called Winnow) keeps one weight for each of t...
Peter Auer, Manfred K. Warmuth
INFOCOM
2010
IEEE
15 years 1 months ago
Collaborative Measurements of Upload Speeds in P2P Systems
—In this paper, we study the theory of collaborative upload bandwidth measurement in peer-to-peer environments. A host can use a bandwidth estimation probe to determine the bandw...
John R. Douceur, James W. Mickens, Thomas Moscibro...
RT
2001
Springer
15 years 7 months ago
An Illumination Model for a Skin Layer Bounded by Rough Surfaces
In this paper we present a novel illumination model that takes into account multiple anisotropic scattering in a layer bounded by two rough surfaces. We compute the model by a dis...
Jos Stam
MANSCI
2008
122views more  MANSCI 2008»
15 years 3 months ago
Incorporating Asymmetric Distributional Information in Robust Value-at-Risk Optimization
Value-at-Risk (VaR) is one of the most widely accepted risk measures in the financial and insurance industries, yet efficient optimization of VaR remains a very difficult problem....
Karthik Natarajan, Dessislava Pachamanova, Melvyn ...
ITIIS
2008
110views more  ITIIS 2008»
15 years 3 months ago
Fast Detection of Distributed Global Scale Network Attack Symptoms and Patterns in High-speed Backbone Networks
Traditional attack detection schemes based on packets or flows have very high computational complexity. And, network based anomaly detection schemes can reduce the complexity, but...
Sun Ho Kim, Byeong-hee Roh