Sciweavers

3356 search results - page 135 / 672
» Thresholds and Expectation Thresholds
Sort
View
101
Voted
STOC
2007
ACM
140views Algorithms» more  STOC 2007»
16 years 29 days ago
On the submodularity of influence in social networks
We prove and extend a conjecture of Kempe, Kleinberg, and Tardos (KKT) on the spread of influence in social networks. A social network can be represented by a directed graph where...
Elchanan Mossel, Sébastien Roch
102
Voted
ICPR
2000
IEEE
16 years 1 months ago
Novelty Detection in Airframe Strain Data
The structural health of airframes is often monitored by analysis of the frequency of occurrence matrix (FOOM) produced after each flight. Each cell in the matrix records a stress...
Simon J. Hickinbotham, James Austin
136
Voted
IWIA
2006
IEEE
15 years 6 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
106
Voted
ICANNGA
2007
Springer
100views Algorithms» more  ICANNGA 2007»
15 years 4 months ago
Softening Splits in Decision Trees Using Simulated Annealing
Predictions computed by a classification tree are usually constant on axis-parallel hyperrectangles corresponding to the leaves and have strict jumps on their boundaries. The densi...
Jakub Dvorák, Petr Savický
100
Voted
ICMAS
2000
15 years 2 months ago
Surplus Equivalence of Leveled Commitment Contracts
In automated negotiation systems consisting of self-interested agents, contracts have traditionally been binding. Leveled commitment contracts--i.e., contracts where each party ca...
Tuomas Sandholm, Yunhong Zhou