Sciweavers

370 search results - page 60 / 74
» Fault-tolerant facility location
Sort
View
SODA
2010
ACM
208views Algorithms» more  SODA 2010»
14 years 5 months ago
Correlation Robust Stochastic Optimization
We consider a robust model proposed by Scarf, 1958, for stochastic optimization when only the marginal probabilities of (binary) random variables are given, and the correlation be...
Shipra Agrawal, Yichuan Ding, Amin Saberi, Yinyu Y...
CVPR
2010
IEEE
14 years 4 months ago
Globally Optimal Pixel Labeling Algorithms for Tree Metrics
We consider pixel labeling problems where the label set forms a tree, and where the observations are also labels. Such problems arise in feature-space analysis with a very large...
Pedro Felzenszwalb, Gyula Pap, Eva Tardos, Ramin Z...
CDC
2008
IEEE
137views Control Systems» more  CDC 2008»
14 years 2 months ago
Coverage control for nonholonomic agents
— Consider a coverage problem for a team of agents in the plane: target points appear sporadically over time in a bounded environment and must be visited by one of the agents. It...
John Enright, Ketan Savla, Emilio Frazzoli
DSN
2008
IEEE
14 years 2 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
ISM
2006
IEEE
86views Multimedia» more  ISM 2006»
14 years 1 months ago
OreDesk: A Tool for Retrieving Data History Based on User Operations
During day-to-day activities, a user refers to various data items on a PC, such as documents, images, and audio clips. However, when the number of items in the history increases, ...
Ryo Ohsawa, Kazunori Takashio, Hideyuki Tokuda