Sciweavers

5580 search results - page 1007 / 1116
» Randomized priority algorithms
Sort
View
ICIW
2009
IEEE
13 years 5 months ago
Utilizing RSS Feeds for Crawling the Web
We present "advaRSS" crawling mechanism which is created in order to support peRSSonal, a mechanism used to create personalized RSS feeds. In contrast to the common crawl...
George Adam, Christos Bouras, Vassilis Poulopoulos
IFIPTM
2009
127views Management» more  IFIPTM 2009»
13 years 5 months ago
A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy
Effective defense against Internet threats requires data on global real time network status. Internet sensor networks provide such real time network data. However, an organization...
Camilo H. Viecco, L. Jean Camp
COLT
2010
Springer
13 years 5 months ago
Nonparametric Bandits with Covariates
We consider a bandit problem which involves sequential sampling from two populations (arms). Each arm produces a noisy reward realization which depends on an observable random cov...
Philippe Rigollet, Assaf Zeevi
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 5 months ago
Evolutionary Approach to Test Generation for Functional BIST
In the paper, an evolutionary approach to test generation for functional BIST is considered. The aim of the proposed scheme is to minimize the test data volume by allowing the dev...
Y. A. Skobtsov, D. E. Ivanov, V. Y. Skobtsov, Raim...
IJWMC
2010
115views more  IJWMC 2010»
13 years 5 months ago
Small-world effects in wireless agent sensor networks
Coverage, fault tolerance and power consumption constraints make optimal placement of mobile sensors or other mobile agents a hard problem. We have developed a model for describin...
Kenneth A. Hawick, Heath A. James
« Prev « First page 1007 / 1116 Last » Next »