Sciweavers

2280 search results - page 364 / 456
» Global Optimization for Optimal Generalized Procrustes Analy...
Sort
View
WISEC
2010
ACM
15 years 11 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
CODES
2009
IEEE
15 years 11 months ago
Exploiting data-redundancy in reliability-aware networked embedded system design
This paper presents a system-level design methodology for networked embedded systems that exploits existing data-redundancy to increase their reliability. The presented approach n...
Martin Lukasiewycz, Michael Glaß, Jürge...
WEBDB
2009
Springer
112views Database» more  WEBDB 2009»
15 years 11 months ago
Querying DAG-shaped Execution Traces Through Views
The question whether a given set of views, defined by queries, can be used to answer another query, arises in several contexts such as query optimization, data integration and se...
Maya Ben-Ari, Tova Milo, Elad Verbin
GECCO
2009
Springer
101views Optimization» more  GECCO 2009»
15 years 11 months ago
Modeling UCS as a mixture of experts
We present a probabilistic formulation of UCS (a sUpervised Classifier System). UCS is shown to be a special case of mixture of experts where the experts are learned independentl...
Narayanan Unny Edakunni, Tim Kovacs, Gavin Brown, ...
GECCO
2009
Springer
127views Optimization» more  GECCO 2009»
15 years 11 months ago
Geometrical insights into the dendritic cell algorithm
This work examines the dendritic cell algorithm (DCA) from a mathematical perspective. By representing the signal processing phase of the algorithm using the dot product it is sho...
Thomas Stibor, Robert Oates, Graham Kendall, Jonat...