Sciweavers

1941 search results - page 84 / 389
» On Generalizations of Network Design Problems with Degree Bo...
Sort
View
134
Voted
MOBIHOC
2005
ACM
16 years 11 days ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
59
Voted
ICML
2010
IEEE
15 years 1 months ago
Internal Rewards Mitigate Agent Boundedness
Abstract--Reinforcement learning (RL) research typically develops algorithms for helping an RL agent best achieve its goals-however they came to be defined--while ignoring the rela...
Jonathan Sorg, Satinder P. Singh, Richard Lewis
94
Voted
TSMC
2002
91views more  TSMC 2002»
15 years 13 days ago
On the sure criticality of tasks in activity networks with imprecise durations
Abstract--The notion of the necessary criticality (both with respect to path and to activity) of a network with imprecisely defined (by means of intervals or fuzzy intervals) activ...
Stefan Chanas, Didier Dubois, Pawel Zielinski
118
Voted
KDD
2008
ACM
174views Data Mining» more  KDD 2008»
16 years 1 months ago
Effective label acquisition for collective classification
Information diffusion, viral marketing, and collective classification all attempt to model and exploit the relationships in a network to make inferences about the labels of nodes....
Mustafa Bilgic, Lise Getoor
CORR
2007
Springer
125views Education» more  CORR 2007»
15 years 23 days ago
Gaussian Interference Channel Capacity to Within One Bit
—The capacity of the two-user Gaussian interference channel has been open for 30 years. The understanding on this problem has been limited. The best known achievable region is du...
Raul Etkin, David Tse, Hua Wang