Sciweavers

146 search results - page 22 / 30
» Independence Assumptions Considered Harmful
Sort
View
CDC
2010
IEEE
104views Control Systems» more  CDC 2010»
13 years 2 months ago
Single timescale regularized stochastic approximation schemes for monotone Nash games under uncertainty
Abstract-- In this paper, we consider the distributed computation of equilibria arising in monotone stochastic Nash games over continuous strategy sets. Such games arise in setting...
Jayash Koshal, Angelia Nedic, Uday V. Shanbhag
EUROCRYPT
2007
Springer
14 years 1 months ago
Feistel Networks Made Public, and Applications
Feistel Network, consisting of a repeated application of the Feistel Transform, gives a very convenient and popular method for designing “cryptographically strong” permutations...
Yevgeniy Dodis, Prashant Puniya
CIKM
2010
Springer
13 years 6 months ago
Discriminative factored prior models for personalized content-based recommendation
Most existing content-based filtering approaches including Rocchio, Language Models, SVM, Logistic Regression, Neural Networks, etc. learn user profiles independently without ca...
Lanbo Zhang, Yi Zhang 0001
TROB
2010
142views more  TROB 2010»
13 years 2 months ago
Extension of the Form-Closure Property to Underactuated Hands
The property of form-closure of a grasp, as generally defined in the literature, is based on the assumption that contact points between the hand and the object are fixed in space. ...
Sébastien Krut, Vincent Begoc, Etienne Domb...
CSFW
2008
IEEE
14 years 1 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang