Sciweavers

1162 search results - page 212 / 233
» An Information-Based Theory of Conditionals
Sort
View
NDSS
2008
IEEE
14 years 2 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
FOCS
2007
IEEE
14 years 2 months ago
On the Hardness and Smoothed Complexity of Quasi-Concave Minimization
In this paper, we resolve the smoothed and approximative complexity of low-rank quasi-concave minimization, providing both upper and lower bounds. As an upper bound, we provide th...
Jonathan A. Kelner, Evdokia Nikolova
SECON
2007
IEEE
14 years 1 months ago
Robust Routing and Scheduling in Wireless Mesh Networks
—Joint routing-and-scheduling has been considered in wireless mesh networks for its significant performance improvement. While existing work assumes it, accurate traffic inform...
Wei Wang, Xin Liu, Dilip Krishnaswamy
ATAL
2007
Springer
14 years 1 months ago
Aborting tasks in BDI agents
Intelligent agents that are intended to work in dynamic environments must be able to gracefully handle unsuccessful tasks and plans. In addition, such agents should be able to mak...
John Thangarajah, James Harland, David N. Morley, ...
DAARC
2007
Springer
120views Algorithms» more  DAARC 2007»
14 years 1 months ago
Empirically Assessing Effects of the Right Frontier Constraint
In a questionnaire study the effects of discourse structural information on resolving inter-sentential anaphora were investigated. The Right Frontier Constraint, first proposed by ...
Anke Holler, Lisa Irmen