Sciweavers

203 search results - page 12 / 41
» Second-Order Risk Constraints
Sort
View
ACMICEC
2003
ACM
97views ECommerce» more  ACMICEC 2003»
14 years 18 days ago
Risk and user preferences in winner determination
We discuss a solution to the winner determination problem which takes into account not only costs but also risk aversion of the agent that accepts the bids. We are interested in b...
Güleser K. Demir, Maria L. Gini
IROS
2009
IEEE
146views Robotics» more  IROS 2009»
14 years 2 months ago
Robust constraint-consistent learning
— Many everyday human skills can be framed in terms of performing some task subject to constraints imposed by the environment. Constraints are usually unobservable and frequently...
Matthew Howard, Stefan Klanke, Michael Gienger, Ch...
TIP
2010
107views more  TIP 2010»
13 years 2 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
ICML
2006
IEEE
14 years 8 months ago
Efficient MAP approximation for dense energy functions
We present an efficient method for maximizing energy functions with first and second order potentials, suitable for MAP labeling estimation problems that arise in undirected graph...
Marius Leordeanu, Martial Hebert
HICSS
2007
IEEE
162views Biometrics» more  HICSS 2007»
14 years 1 months ago
Value-at-Risk in IT Services Contracts
As information systems (IS) and technology solutions become increasingly service-driven, managers are faced with the task of choosing parameters such as service-levels, pricing, a...
Robert J. Kauffman, Ryan Sougstad