Sciweavers

1362 search results - page 72 / 273
» Means, Correlations and Bounds
Sort
View
FSTTCS
2007
Springer
15 years 8 months ago
Probabilistic Analysis of the Degree Bounded Minimum Spanning Tree Problem
In the b-degree constrained Euclidean minimum spanning tree problem (bMST) we are given n points in [0;1]d and a degree constraint b  2. The aim is to nd a minimum weight spannin...
Anand Srivastav, Sören Werth
RSA
2006
91views more  RSA 2006»
15 years 1 months ago
Average case analysis of the Boyer-Moore algorithm
Limit theorems (including a Berry-Esseen bound) are derived for the number of comparisons taken by the Boyer-Moore algorithm for finding the occurrences of a given pattern in a ra...
Tsung-Hsi Tsai
MASCOTS
2004
15 years 3 months ago
Size-Based Scheduling Policies with Inaccurate Scheduling Information
Size-based scheduling policies such as SRPT have been studied since 1960s and have been applied in various arenas including packet networks and web server scheduling. SRPT has bee...
Dong Lu, Huanyuan Sheng, Peter A. Dinda
TON
2008
106views more  TON 2008»
15 years 1 months ago
Statistical techniques for detecting traffic anomalies through packet header data
This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastr...
Seong Soo Kim, A. L. Narasimha Reddy
ICASSP
2011
IEEE
14 years 5 months ago
Modeling microstructure noise using Hawkes processes
Hawkes processes are used for modeling tick-by-tick variations of a single or of a pair of asset prices. For each asset, two counting processes (with stochastic intensities) are a...
Emmanuel Bacry, Sylvain Delattre, Marc Hoffmann, J...