Sciweavers

14809 search results - page 2855 / 2962
» Model transformation by demonstration
Sort
View
ATAL
2007
Springer
14 years 4 months ago
Bidding optimally in concurrent second-price auctions of perfectly substitutable goods
We derive optimal bidding strategies for a global bidding agent that participates in multiple, simultaneous second-price auctions with perfect substitutes. We first consider a mo...
Enrico H. Gerding, Rajdeep K. Dash, David C. K. Yu...
ATAL
2007
Springer
14 years 4 months ago
On opportunistic techniques for solving decentralized Markov decision processes with temporal constraints
Decentralized Markov Decision Processes (DEC-MDPs) are a popular model of agent-coordination problems in domains with uncertainty and time constraints but very difficult to solve...
Janusz Marecki, Milind Tambe
CCS
2007
ACM
14 years 4 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
CIVR
2007
Springer
192views Image Analysis» more  CIVR 2007»
14 years 4 months ago
Texture retrieval based on a non-parametric measure for multivariate distributions
In the present study, an efficient strategy for retrieving texture images from large texture databases is introduced and studied within a distributional-statistical framework. Our...
Vasileios K. Pothos, Christos Theoharatos, George ...
EMSOFT
2007
Springer
14 years 4 months ago
Optimal task placement to improve cache performance
Most recent embedded systems use caches to improve their average performance. Current timing analyses are able to compute safe timing guarantees for these systems, if tasks are ru...
Gernot Gebhard, Sebastian Altmeyer
« Prev « First page 2855 / 2962 Last » Next »