Sciweavers

1565 search results - page 181 / 313
» An unlikely result
Sort
View
AAAI
2007
14 years 1 months ago
Unscented Message Passing for Arbitrary Continuous Variables in Bayesian Networks
Since Bayesian network (BN) was introduced in the field of artificial intelligence in 1980s, a number of inference algorithms have been developed for probabilistic reasoning. Ho...
Wei Sun, Kuo-Chu Chang
AIPS
2008
14 years 1 months ago
Unifying the Causal Graph and Additive Heuristics
Many current heuristics for domain-independent planning, such as Bonet and Geffner's additive heuristic and Hoffmann and Nebel's FF heuristic, are based on delete relaxa...
Malte Helmert, Hector Geffner
LISA
2007
14 years 1 months ago
PolicyVis: Firewall Security Policy Visualization and Inspection
Firewalls have an important role in network security. However, managing firewall policies is an extremely complex task because the large number of interacting rules in single or d...
Tung Tran, Ehab S. Al-Shaer, Raouf Boutaba
NSDI
2008
14 years 1 months ago
Effective Diagnosis of Routing Disruptions from End Systems
Internet routing events are known to introduce severe disruption to applications. So far effective diagnosis of routing events has relied on proprietary ISP data feeds, resulting ...
Ying Zhang, Zhuoqing Morley Mao, Ming Zhang
NSDI
2008
14 years 1 months ago
One Hop Reputations for Peer to Peer File Sharing Workloads
An emerging paradigm in peer-to-peer (P2P) networks is to explicitly consider incentives as part of the protocol design in order to promote good (or discourage bad) behavior. Howe...
Michael Piatek, Tomas Isdal, Arvind Krishnamurthy,...