Sciweavers

440 search results - page 71 / 88
» Robustness and modular structure in networks
Sort
View
66
Voted
ICML
2006
IEEE
15 years 10 months ago
Kernelizing the output of tree-based methods
We extend tree-based methods to the prediction of structured outputs using a kernelization of the algorithm that allows one to grow trees as soon as a kernel can be defined on the...
Florence d'Alché-Buc, Louis Wehenkel, Pierr...
IJCNN
2007
IEEE
15 years 4 months ago
Integrating a Flexible Representation Machinery in a Model of Human Concept Learning
— High-order human cognition involves processing of abstract and categorically represented knowledge. Traditionally, it has been considered that there is a single innate internal...
Toshihiko Matsuka, Yasuaki Sakamoto
USENIX
2008
14 years 12 months ago
Improving Scalability and Fault Tolerance in an Application Management Infrastructure
This paper explores the challenges associated with distributed application management in large-scale computing environments. In particular, we investigate several techniques for e...
Nikolay Topilski, Jeannie R. Albrecht, Amin Vahdat
97
Voted
PDPTA
2004
14 years 11 months ago
Towards an Adaptive Economic Society of Peers
This paper presents our on-going research into selforganizing and self-healing networks of resource brokers, for use in complex Peer-to-Peer (P2P) resource sharing and Grid comput...
Paul Silvey
75
Voted
IJNSEC
2008
108views more  IJNSEC 2008»
14 years 9 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...