Sciweavers

2031 search results - page 402 / 407
» Natural Evolution Strategies
Sort
View
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
14 years 7 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
KDD
2010
ACM
289views Data Mining» more  KDD 2010»
14 years 7 months ago
Exploitation and exploration in a performance based contextual advertising system
The dynamic marketplace in online advertising calls for ranking systems that are optimized to consistently promote and capitalize better performing ads. The streaming nature of on...
Wei Li 0010, Xuerui Wang, Ruofei Zhang, Ying Cui, ...
94
Voted
MOBIHOC
2010
ACM
14 years 7 months ago
Breaking bidder collusion in large-scale spectrum auctions
Dynamic spectrum auction is an effective solution to provide spectrum on-demand to many small wireless networks. As the number of participants grows, bidder collusion becomes a se...
Xia Zhou, Haitao Zheng
WAW
2010
Springer
311views Algorithms» more  WAW 2010»
14 years 7 months ago
Game-Theoretic Models of Information Overload in Social Networks
We study the effect of information overload on user engagement in an asymmetric social network like Twitter. We introduce simple game-theoretic models that capture rate competition...
Christian Borgs, Jennifer T. Chayes, Brian Karrer,...
94
Voted
WCNC
2010
IEEE
14 years 7 months ago
Physical Layer Network Coding with Multiple Antennas
: The two-phase MIMO NC (network coding) scheme can be used to boost the throughput in a two-way relay channel in which nodes are equipped with multiple antennas. The obvious strat...
Shengli Zhang, Soung Chang Liew