Sciweavers

165 search results - page 26 / 33
» Comparing Set-Covering Strategies for Optimal Corpus Design
Sort
View
AAAI
2008
13 years 11 months ago
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact...
Scott Dejmal, Alan Fern, Thinh Nguyen
CORR
2008
Springer
212views Education» more  CORR 2008»
13 years 9 months ago
Joint Adaptive Modulation-Coding and Cooperative ARQ for Wireless Relay Networks
This paper presents a cross-layer approach to jointly design adaptive modulation and coding (AMC) at the physical layer and cooperative truncated automatic repeat request (ARQ) pro...
Morteza Mardani, Jalil S. Harsini, Farshad Lahouti...
ICASSP
2009
IEEE
13 years 6 months ago
Tree configuration games for distributed stream mining systems
We consider the problem of configuring classifier trees in distributed stream mining system. The configuration involves selecting appropriate false-alarm detection tradeoffs for e...
Hyunggon Park, Deepak S. Turaga, Olivier Verscheur...
ICDCS
2009
IEEE
14 years 6 months ago
m-LIGHT: Indexing Multi-Dimensional Data over DHTs
In this paper, we study the problem of indexing multidimensional data in the P2P networks based on distributed hash tables (DHTs). We identify several design issues and propose a ...
Yuzhe Tang, Jianliang Xu, Shuigeng Zhou, Wang-Chie...
AMMA
2009
Springer
14 years 3 months ago
A Market-Based Approach to Multi-factory Scheduling
Abstract. In this paper, we report on the design of a novel market-based approach for decentralised scheduling across multiple factories. Specifically, because of the limitations ...
Perukrishnen Vytelingum, Alex Rogers, Douglas K. M...