Sciweavers

12148 search results - page 2369 / 2430
» Generalized Bundle Methods
Sort
View
ISI
2008
Springer
13 years 10 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
IJFCS
2006
58views more  IJFCS 2006»
13 years 10 months ago
Covering of Transient Simulation of Feedback-free Circuits by Binary Analysis
Transient simulation of a gate circuit is an efficient method of counting signal changes occurring during a transition of the circuit. It is known that this simulation covers the ...
Yuli Ye, Janusz A. Brzozowski
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 10 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
CORR
2007
Springer
109views Education» more  CORR 2007»
13 years 10 months ago
Delayed Sequential Coding of Correlated Sources
— Motivated by video coding applications, we study the problem of sequential coding of correlated sources with (noncausal) encoding and/or decoding frame-delays. The fundamental ...
Nan Ma, Ye Wang, Prakash Ishwar
IJRR
2006
126views more  IJRR 2006»
13 years 10 months ago
Market-based Multirobot Coordination for Complex Tasks
Current technological developments and application-driven demands are bringing us closer to the realization of autonomous multirobot systems performing increasingly complex missio...
Robert Zlot, Anthony Stentz
« Prev « First page 2369 / 2430 Last » Next »