Sciweavers

546 search results - page 34 / 110
» Behavioral experiments in networked trade
Sort
View
GECCO
2011
Springer
264views Optimization» more  GECCO 2011»
13 years 3 days ago
Critical factors in the performance of novelty search
Novelty search is a recently proposed method for evolutionary computation designed to avoid the problem of deception, in which the fitness function guides the search process away...
Steijn Kistemaker, Shimon Whiteson
SIGMOD
2003
ACM
171views Database» more  SIGMOD 2003»
14 years 8 months ago
Adaptive Filters for Continuous Queries over Distributed Data Streams
We consider an environment where distributed data sources continuously stream updates to a centralized processor that monitors continuous queries over the distributed data. Signif...
Chris Olston, Jing Jiang, Jennifer Widom
SOSP
2001
ACM
14 years 5 months ago
The Costs and Limits of Availability for Replicated Services
As raw system and network performance continues to improve at exponential rates, the utility of many services is increasingly limited by availability rather than performance. A ke...
Haifeng Yu, Amin Vahdat
ESORICS
2007
Springer
14 years 2 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
14 years 2 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...