Sciweavers

1057 search results - page 176 / 212
» Peer-to-Peer utility maximization
Sort
View
CORR
2010
Springer
122views Education» more  CORR 2010»
14 years 9 months ago
Harvesting Collective Intelligence: Temporal Behavior in Yahoo Answers
When harvesting collective intelligence, a user wishes to maximize the accuracy and value of the acquired information without spending too much time collecting it. We empirically ...
Christina Aperjis, Bernardo A. Huberman, Fang Wu
CN
2007
168views more  CN 2007»
14 years 9 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
EAAI
2007
93views more  EAAI 2007»
14 years 9 months ago
Mining Pareto-optimal rules with respect to support and confirmation or support and anti-support
: In knowledge discovery and data mining many measures of interestingness have been proposed in order to measure the relevance and utility of the discovered patterns. Among these m...
Izabela Brzezinska, Salvatore Greco, Roman Slowins...
IJCV
2008
157views more  IJCV 2008»
14 years 9 months ago
A General Method for Sensor Planning in Multi-Sensor Systems: Extension to Random Occlusion
Systems utilizing multiple sensors are required in many domains. In this paper, we specifically concern ourselves with applications where dynamic objects appear randomly and the s...
Anurag Mittal, Larry S. Davis
INFOCOM
2010
IEEE
14 years 8 months ago
Optimal SINR-based Random Access
— Random access protocols, such as Aloha, are commonly modeled in wireless ad-hoc networks by using the protocol model. However, it is well-known that the protocol model is not a...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong, Robe...