Sciweavers

1207 search results - page 61 / 242
» Towards optimal k-anonymization
Sort
View
95
Voted
DEBU
2008
156views more  DEBU 2008»
15 years 24 days ago
Towards Automatic Test Database Generation
Testing is one of the most expensive and time consuming activities in the software development cycle. In order to reduce the cost and the time to market, many approaches to automa...
Carsten Binnig, Donald Kossmann, Eric Lo
109
Voted
CORR
2007
Springer
119views Education» more  CORR 2007»
15 years 21 days ago
Towards the Secrecy Capacity of the Gaussian MIMO Wire-tap Channel: The 2-2-1 Channel
—We find the secrecy capacity of the 2-2-1 Gaussian MIMO wiretap channel, which consists of a transmitter and a receiver with two antennas each, and an eavesdropper with a singl...
Shabnam Shafiee, Nan Liu, Sennur Ulukus
ICRA
2009
IEEE
127views Robotics» more  ICRA 2009»
14 years 10 months ago
Roombots-mechanical design of self-reconfiguring modular robots for adaptive furniture
We aim at merging technologies from information technology, roomware, and robotics in order to design adaptive and intelligent furniture. This paper presents design principles for ...
Alexander Spröwitz, Aude Billard, Pierre Dill...
127
Voted
JMLR
2010
119views more  JMLR 2010»
14 years 7 months ago
A Convergent Online Single Time Scale Actor Critic Algorithm
Actor-Critic based approaches were among the first to address reinforcement learning in a general setting. Recently, these algorithms have gained renewed interest due to their gen...
Dotan Di Castro, Ron Meir
87
Voted
INFOCOM
2011
IEEE
14 years 4 months ago
Incentive provision using intervention
Abstract—Overcoming the inefficiency of non-cooperative outcomes poses an important challenge for network managers in achieving efficient utilization of network resources. This...
Jaeok Park, Mihaela van der Schaar