Sciweavers

10458 search results - page 1758 / 2092
» Modeling Features at Runtime
Sort
View
130
Voted
ISDO
2000
181views Business» more  ISDO 2000»
15 years 5 months ago
eFlow: an Open, Flexible and Configurable Approach to Service Composition
The Web is rapidly becoming the platform through which many companies deliver services to businesses and individual customers. E-Services are typically delivered point-to-point; h...
Fabio Casati
143
Voted
NIPS
1997
15 years 5 months ago
EM Algorithms for PCA and SPCA
I present an expectation-maximization (EM) algorithm for principal component analysis (PCA). The algorithm allows a few eigenvectors and eigenvalues to be extracted from large col...
Sam T. Roweis
155
Voted
ADHOC
2010
195views more  ADHOC 2010»
15 years 3 months ago
SDRT: A reliable data transport protocol for underwater sensor networks
In this paper, we investigate the reliable data transport problem in underwater sensor networks. Underwater sensor networks are significantly different from terrestrial sensor net...
Peng Xie, Zhong Zhou, Zheng Peng, Jun-Hong Cui, Zh...
141
Voted
ALGORITHMICA
2010
152views more  ALGORITHMICA 2010»
15 years 3 months ago
Gaming Prediction Markets: Equilibrium Strategies with a Market Maker
We study the equilibrium behavior of informed traders interacting with market scoring rule (MSR) market makers. One attractive feature of MSR is that it is myopically incentive com...
Yiling Chen, Stanko Dimitrov, Rahul Sami, Daniel M...
147
Voted
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 3 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
« Prev « First page 1758 / 2092 Last » Next »