Sciweavers

628 search results - page 119 / 126
» Scheduling Algorithm with Potential Behaviors
Sort
View
WINET
2002
144views more  WINET 2002»
13 years 7 months ago
Exposure in Wireless Sensor Networks: Theory and Practical Solutions
Wireless ad-hoc sensor networks have the potential to provide the missing interface between the physical world and the Internet, thus impacting a large number of users. This conne...
Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Gia...
NIPS
2008
13 years 9 months ago
On the Reliability of Clustering Stability in the Large Sample Regime
Clustering stability is an increasingly popular family of methods for performing model selection in data clustering. The basic idea is that the chosen model should be stable under...
Ohad Shamir, Naftali Tishby
ICSE
2005
IEEE-ACM
14 years 7 months ago
Efficient and precise dynamic impact analysis using execute-after sequences
As software evolves, impact analysis estimates the potential effects of changes, before or after they are made, by identifying which parts of the software may be affected by such ...
Taweesup Apiwattanapong, Alessandro Orso, Mary Jea...
AAAI
1994
13 years 9 months ago
High Dimension Action Spaces in Robot Skill Learning
Table lookup with interpolation is used for many learning and adaptation tasks. Redundant mappings capture the important concept of \motor skill," which is important in real,...
Jeff G. Schneider
ACSAC
2010
IEEE
12 years 11 months ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon