Sciweavers

7978 search results - page 1572 / 1596
» Combining shared-coin algorithms
Sort
View
CN
2008
84views more  CN 2008»
13 years 10 months ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
CORR
2010
Springer
208views Education» more  CORR 2010»
13 years 10 months ago
Bounded Model Checking of Multi-threaded Software using SMT solvers
The transition from single-core to multi-core processors has made multi-threaded software an important subject in computer aided verification. Here, we describe and evaluate an ex...
Lucas Cordeiro, Bernd Fischer 0002
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 10 months ago
Neuroevolutionary optimization
Temporal difference methods are theoretically grounded and empirically effective methods for addressing reinforcement learning problems. In most real-world reinforcement learning ...
Eva Volná
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 10 months ago
Polynomial Learning of Distribution Families
Abstract--The question of polynomial learnability of probability distributions, particularly Gaussian mixture distributions, has recently received significant attention in theoreti...
Mikhail Belkin, Kaushik Sinha
CORR
2010
Springer
174views Education» more  CORR 2010»
13 years 10 months ago
Collaborative Spectrum Sensing from Sparse Observations in Cognitive Radio Networks
Spectrum sensing, which aims at detecting spectrum holes, is the precondition for the implementation of cognitive radio. Collaborative spectrum sensing among the cognitive radio n...
Jia Meng, Wotao Yin, Husheng Li, Ekram Hossain, Zh...
« Prev « First page 1572 / 1596 Last » Next »