Sciweavers

738 search results - page 144 / 148
» More generality in efficient multiple kernel learning
Sort
View
VDA
2010
200views Visualization» more  VDA 2010»
13 years 10 months ago
Operator-centric design patterns for information visualization software
Design patterns have proven to be a useful means to make the process of designing, developing, and reusing software systems more efficient. In the area of information visualizatio...
Zaixian Xie, Zhenyu Guo, Matthew O. Ward, Elke A. ...
ATAL
2010
Springer
13 years 8 months ago
Deception in networks of mobile sensing agents
Recent studies have investigated how a team of mobile sensors can cope with real world constraints, such as uncertainty in the reward functions, dynamically appearing and disappea...
Viliam Lisý, Roie Zivan, Katia P. Sycara, M...
ATAL
2010
Springer
13 years 8 months ago
False-name-proofness with bid withdrawal
We study a more powerful variant of false-name manipulation in Internet auctions: an agent can submit multiple false-name bids, but then, once the allocation and payments have bee...
Mingyu Guo, Vincent Conitzer
SIAMCOMP
2002
152views more  SIAMCOMP 2002»
13 years 7 months ago
Maintaining Stream Statistics over Sliding Windows
We consider the problem of maintaining aggregates and statistics over data streams, with respect to the last N data elements seen so far. We refer to this model as the sliding wind...
Mayur Datar, Aristides Gionis, Piotr Indyk, Rajeev...
CASES
2010
ACM
13 years 5 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman