Sciweavers

1690 search results - page 261 / 338
» Serial experiments online
Sort
View
LION
2010
Springer
190views Optimization» more  LION 2010»
15 years 8 months ago
Algorithm Selection as a Bandit Problem with Unbounded Losses
Abstract. Algorithm selection is typically based on models of algorithm performance learned during a separate offline training sequence, which can be prohibitively expensive. In r...
Matteo Gagliolo, Jürgen Schmidhuber
DIM
2007
ACM
15 years 8 months ago
Receipt management- transaction history based trust establishment
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...
Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bert...
ELPUB
2007
ACM
15 years 8 months ago
A Comparison of the Blogging Practices of UK and US Bloggers
This paper describes the results of an investigation into the differences and similarities between the blogging techniques of UK and US bloggers undertaken in the winter and sprin...
Sarah Pedersen
ICDCS
2010
IEEE
15 years 8 months ago
Quantifying and Querying Network Reachability
—Quantifying and querying network reachability is important for security monitoring and auditing as well as many aspects of network management such as troubleshooting, maintenanc...
Amir R. Khakpour, Alex X. Liu
AIRWEB
2006
Springer
15 years 8 months ago
Improving Cloaking Detection using Search Query Popularity and Monetizability
Cloaking is a search engine spamming technique used by some Web sites to deliver one page to a search engine for indexing while serving an entirely different page to users browsin...
Kumar Chellapilla, David Maxwell Chickering