Sciweavers

1696 search results - page 290 / 340
» Permuted function matching
Sort
View
SIGCOMM
2010
ACM
14 years 10 months ago
Scalable flow-based networking with DIFANE
Ideally, enterprise administrators could specify fine-grain policies that drive how the underlying switches forward, drop, and measure traffic. However, existing techniques for fl...
Minlan Yu, Jennifer Rexford, Michael J. Freedman, ...
CORR
2010
Springer
169views Education» more  CORR 2010»
14 years 10 months ago
The Privacy Coach: Supporting customer privacy in the Internet of Things
The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase c...
Gerben Broenink, Jaap-Henk Hoepman, Christian van ...
CORR
2008
Springer
64views Education» more  CORR 2008»
14 years 10 months ago
Linearly Parameterized Bandits
We consider bandit problems involving a large (possibly infinite) collection of arms, in which the expected reward of each arm is a linear function of an r-dimensional random vect...
Paat Rusmevichientong, John N. Tsitsiklis
BMCBI
2006
141views more  BMCBI 2006»
14 years 10 months ago
Maximum common subgraph: some upper bound and lower bound results
Background: Structure matching plays an important part in understanding the functional role of biological structures. Bioinformatics assists in this effort by reformulating this p...
Xiuzhen Huang, Jing Lai, Steven F. Jennings
COMPUTER
2006
98views more  COMPUTER 2006»
14 years 10 months ago
Energy-Aware User Interfaces and Energy-Adaptive Displays
The utility of a mobile computer, such as a handheld or a laptop, is largely constrained by battery life. The display stands out as a major consumer of battery energy, so reducing...
Parthasarathy Ranganathan, Erik Geelhoed, Meera Ma...