Sciweavers

463 search results - page 60 / 93
» Method Tailoring as Negotiation
Sort
View
CORR
2007
Springer
140views Education» more  CORR 2007»
13 years 9 months ago
From the entropy to the statistical structure of spike trains
— We use statistical estimates of the entropy rate of spike train data in order to make inferences about the underlying structure of the spike train itself. We first examine a n...
Yun Gao, Ioannis Kontoyiannis, Elie Bienenstock
AAMAS
2002
Springer
13 years 9 months ago
Multiagent Learning for Open Systems: A Study in Opponent Classification
Abstract. Open systems are becoming increasingly important in a variety of distributed, networked computer applications. Their characteristics, such as agent diversity, heterogenei...
Michael Rovatsos, Gerhard Weiß, Marco Wolf
NECO
2002
100views more  NECO 2002»
13 years 9 months ago
Robust Regression with Asymmetric Heavy-Tail Noise Distributions
In the presence of a heavy-tail noise distribution, regression becomes much more di cult. Traditional robust regression methods assume that the noise distribution is symmetric and...
Ichiro Takeuchi, Yoshua Bengio, Takafumi Kanamori
TIP
2002
183views more  TIP 2002»
13 years 9 months ago
Speckle reducing anisotropic diffusion
This paper provides the derivation of speckle reducing anisotropic diffusion (SRAD), a diffusion method tailored to ultrasonic and radar imaging applications. SRAD is the edge-sens...
Yongjian Yu, Scott T. Acton
INFOCOM
2010
IEEE
13 years 7 months ago
Predictive Blacklisting as an Implicit Recommendation System
A widely used defense practice against malicious traffic on the Internet is to maintain blacklists, i.e., lists of prolific attack sources that have generated malicious activity in...
Fabio Soldo, Anh Le, Athina Markopoulou