Sciweavers

273 search results - page 15 / 55
» Bayesian Communication under Rough Sets Information
Sort
View
SIGMETRICS
1994
ACM
113views Hardware» more  SIGMETRICS 1994»
13 years 11 months ago
Shade: A Fast Instruction-Set Simulator for Execution Profiling
Shade is an instruction-set simulator and custom trace generator. Application programs are executed and traced under the control of a user-supplied trace analyzer. To reduce commu...
Robert F. Cmelik, David Keppel
JMLR
2002
137views more  JMLR 2002»
13 years 7 months ago
The Subspace Information Criterion for Infinite Dimensional Hypothesis Spaces
A central problem in learning is selection of an appropriate model. This is typically done by estimating the unknown generalization errors of a set of models to be selected from a...
Masashi Sugiyama, Klaus-Robert Müller
INFOCOM
2011
IEEE
12 years 11 months ago
Bayesian-inference based recommendation in online social networks
—In this paper, we propose a Bayesian-inference based recommendation system for online social networks. In our system, users share their content ratings with friends. The rating ...
Xiwang Yang, Yang Guo, Yong Liu
ICC
2007
IEEE
104views Communications» more  ICC 2007»
14 years 1 months ago
Secure Tracking in Sensor Networks
Abstract— Target tracking is a canonical issue in sensor networks research. However, tracking security has gained little or no attention. Once a sensor node is compromised, it wi...
Chih-Chieh Geoff Chang, Wesley E. Snyder, Cliff Wa...
ICC
2007
IEEE
164views Communications» more  ICC 2007»
14 years 1 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao