Sciweavers

11488 search results - page 2117 / 2298
» Robust optimization - methodology and applications
Sort
View
138
Voted
IACR
2011
223views more  IACR 2011»
14 years 3 months ago
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
Abstract. We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1 jointly proposed by Gemalto and Sagem S´ec...
Jean-Sébastien Coron, Aline Gouget, Thomas ...

Publication
240views
14 years 2 months ago
Bayesian multitask inverse reinforcement learning
We generalise the problem of inverse reinforcement learning to multiple tasks, from multiple demonstrations. Each one may represent one expert trying to solve a different task, or ...
Christos Dimitrakakis, Constantin A. Rothkopf
151
Voted
HCI
2009
15 years 1 months ago
Acquiring a Physical World and Serving Its Mirror World Simultaneously
A mirror world, which is a virtual space modeling a physical space, attracts enormous interests from VR community recently. Various applications such as Second Life, Google Earth a...
Sengpyo Hong, Jong-gil Ahn, Heedong Ko, Jinwook Ki...
157
Voted
SIGCOMM
2012
ACM
13 years 6 months ago
Multi-resource fair queueing for packet processing
Middleboxes are ubiquitous in today’s networks and perform a variety of important functions, including IDS, VPN, firewalling, and WAN optimization. These functions differ vastl...
Ali Ghodsi, Vyas Sekar, Matei Zaharia, Ion Stoica
157
Voted
SIGMOD
2012
ACM
202views Database» more  SIGMOD 2012»
13 years 6 months ago
MCJoin: a memory-constrained join for column-store main-memory databases
There exists a need for high performance, read-only mainmemory database systems for OLAP-style application scenarios. Most of the existing works in this area are centered around t...
Steven Keith Begley, Zhen He, Yi-Ping Phoebe Chen
« Prev « First page 2117 / 2298 Last » Next »