Sciweavers

950 search results - page 146 / 190
» presence 2008
Sort
View
USS
2008
15 years 4 hour ago
Multi-flow Attacks Against Network Flow Watermarking Schemes
We analyze several recent schemes for watermarking network flows based on splitting the flow into intervals. We show that this approach creates time dependent correlations that en...
Negar Kiyavash, Amir Houmansadr, Nikita Borisov
104
Voted
ABIALS
2008
Springer
14 years 11 months ago
Anticipatory Learning Classifier Systems and Factored Reinforcement Learning
Factored Reinforcement Learning (frl) is a new technique to solve Factored Markov Decision Problems (fmdps) when the structure of the problem is not known in advance. Like Anticipa...
Olivier Sigaud, Martin V. Butz, Olga Kozlova, Chri...
ACMACE
2008
ACM
14 years 11 months ago
Real binoculars with virtual functions for mixed environments
Though often desirable, the integration of real and virtual elements in mixed reality environments can be difficult. We propose a number of techniques to facilitate scene explorat...
Andrei Sherstyuk, Kin Lik Wang, Anton Treskunov, J...
AIRWEB
2008
Springer
14 years 11 months ago
Cleaning search results using term distance features
The presence of Web spam in query results is one of the critical challenges facing search engines today. While search engines try to combat the impact of spam pages on their resul...
Josh Attenberg, Torsten Suel
APPROX
2008
Springer
127views Algorithms» more  APPROX 2008»
14 years 11 months ago
Approximating Single Machine Scheduling with Scenarios
In the field of robust optimization, the goal is to provide solutions to combinatorial problems that hedge against variations of the numerical parameters. This constitutes an effor...
Monaldo Mastrolilli, Nikolaus Mutsanas, Ola Svenss...