Sciweavers

4372 search results - page 737 / 875
» Algorithmic Theories of Everything
Sort
View
CORR
2011
Springer
172views Education» more  CORR 2011»
14 years 11 months ago
SafeVchat: Detecting Obscene Content and Misbehaving Users in Online Video Chat Services
Online video chat services such as Chatroulette, Omegle, and vChatter that randomly match pairs of users in video chat sessions are fast becoming very popular, with over a million...
Xinyu Xing, Yu-Li Liang, Hanqiang Cheng, Jianxun D...
CORR
2011
Springer
189views Education» more  CORR 2011»
14 years 11 months ago
Analysis of multi-stage open shop processing systems
We study algorithmic problems in multi-stage open shop processing systems that are centered around reachability and deadlock detection questions. We characterize safe and unsafe s...
Christian Eggermont, Alexander Schrijver, Gerhard ...
CORR
2011
Springer
182views Education» more  CORR 2011»
14 years 11 months ago
Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design
— Future power networks will be characterized by safe and reliable functionality against physical malfunctions and cyber attacks. This paper proposes a unified framework and adv...
Fabio Pasqualetti, Florian Dörfler, Francesco...
110
Voted
CORR
2010
Springer
119views Education» more  CORR 2010»
14 years 11 months ago
Effective complexity of stationary process realizations
The concept of effective complexity of an object as the minimal description length of its regularities has been initiated by Gell-Mann and Lloyd. The regularities are modeled by m...
Nihat Ay, Markus Müller, Arleta Szkola
180
Voted
MP
2011
14 years 11 months ago
Null space conditions and thresholds for rank minimization
Minimizing the rank of a matrix subject to constraints is a challenging problem that arises in many applications in machine learning, control theory, and discrete geometry. This c...
Benjamin Recht, Weiyu Xu, Babak Hassibi