Sciweavers

2266 search results - page 110 / 454
» Some Solutions to the Ignoring Problem
Sort
View
WWW
2008
ACM
16 years 2 months ago
Externalities in online advertising
Most models for online advertising assume that an advertiser's value from winning an ad auction, which depends on the clickthrough rate or conversion rate of the advertisemen...
Arpita Ghosh, Mohammad Mahdian
FC
2005
Springer
99views Cryptology» more  FC 2005»
15 years 7 months ago
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling
One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identitycorroborating information. It is exacerbated b...
Paul C. van Oorschot, Stuart G. Stubblebine
DAGSTUHL
1994
15 years 2 months ago
Competitive Strategies for Autonomous Systems
A strategy for working with incomplete information is called competitive if it solves each problem instance at a cost not exceeding the cost of an optimal solution (with full info...
Christian Icking, Rolf Klein
106
Voted
GECCO
2007
Springer
157views Optimization» more  GECCO 2007»
15 years 7 months ago
Global multiobjective optimization via estimation of distribution algorithm with biased initialization and crossover
Multiobjective optimization problems with many local Pareto fronts is a big challenge to evolutionary algorithms. In this paper, two operators, biased initialization and biased cr...
Aimin Zhou, Qingfu Zhang, Yaochu Jin, Bernhard Sen...
WORDS
2003
IEEE
15 years 6 months ago
Asynchrony and Real-Time Dependable Computing
We examine how computer system problems can be derived from real application problems, with a particular focus on the relevance of some assumptions, especially those related to co...
Gérard Le Lann