Sciweavers

627 search results - page 82 / 126
» Dual-Buffering Strategies in Object Bases
Sort
View
CRITIS
2007
13 years 11 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
AIPS
2006
13 years 11 months ago
Plan Stability: Replanning versus Plan Repair
The ultimate objective in planning is to construct plans for execution. However, when a plan is executed in a real environment it can encounter differences between the expected an...
Maria Fox, Alfonso Gerevini, Derek Long, Ivan Seri...
WSC
1997
13 years 11 months ago
Model-Driven Simulation of World-Wide-Web Cache Policies
The World Wide Web (WWW) has experienced a dramatic increase in popularity since 1993. Many reports indicate that its growth will continue at an exponential rate. This growth has ...
Ying Shi, Edward Watson, Ye-Sho Chen
CIKM
2010
Springer
13 years 8 months ago
Learning to rank relevant and novel documents through user feedback
We consider the problem of learning to rank relevant and novel documents so as to directly maximize a performance metric called Expected Global Utility (EGU), which has several de...
Abhimanyu Lad, Yiming Yang
ER
2006
Springer
112views Database» more  ER 2006»
14 years 1 months ago
An Architecture for Emergent Semantics
Emergent Semantics is a new paradigm for inferring semantic meaning from implicit feedback by a sufficiently large number of users of an object retrieval system. In this paper, we ...
Sven Herschel, Ralf Heese, Jens Bleiholder