Sciweavers

3072 search results - page 291 / 615
» Shape analysis algorithm based on information theory
Sort
View
114
Voted
ICSE
2003
IEEE-ACM
16 years 3 months ago
Using Benchmarking to Advance Research: A Challenge to Software Engineering
Benchmarks have been used in computer science to compare the performance of computer systems, information retrieval algorithms, databases, and many other technologies. The creatio...
Susan Elliott Sim, Steve M. Easterbrook, Richard C...
WPES
2003
ACM
15 years 9 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
CORR
2008
Springer
113views Education» more  CORR 2008»
15 years 3 months ago
Gaussian Belief Propagation Solver for Systems of Linear Equations
The canonical problem of solving a system of linear equations arises in numerous contexts in information theory, communication theory, and related fields. In this contribution, we ...
Ori Shental, Paul H. Siegel, Jack K. Wolf, Danny B...
WWW
2008
ACM
16 years 4 months ago
Dynamic cost-per-action mechanisms and applications to online advertising
We study the Cost-Per-Action or Cost-Per-Acquisition (CPA) charging scheme in online advertising. In this scheme, instead of paying per click, the advertisers pay only when a user...
Hamid Nazerzadeh, Amin Saberi, Rakesh Vohra
SIGECOM
2003
ACM
134views ECommerce» more  SIGECOM 2003»
15 years 9 months ago
Correlated equilibria in graphical games
We examine correlated equilibria in the recently introduced formalism of graphical games, a succinct representation for multiplayer games. We establish a natural and powerful rela...
Sham Kakade, Michael J. Kearns, John Langford, Lui...