Sciweavers

203 search results - page 35 / 41
» Second-Order Risk Constraints
Sort
View
NCA
2007
IEEE
13 years 8 months ago
Safety management of complex technology
One of the key success factors behind the human species is the ability to think, plan and pursue goals. Apart from wisdom and tacit knowledge, experience and awareness of the phys...
Ali G. Hessami
JMLR
2010
123views more  JMLR 2010»
13 years 6 months ago
Maximum Relative Margin and Data-Dependent Regularization
Leading classification methods such as support vector machines (SVMs) and their counterparts achieve strong generalization performance by maximizing the margin of separation betw...
Pannagadatta K. Shivaswamy, Tony Jebara
CJ
2010
87views more  CJ 2010»
13 years 6 months ago
Resource-Aware Multimedia Content Delivery: A Gambling Approach
In this paper, we propose a resource-aware solution to achieving reliable and scalable stream diffusion in a probabilistic model, i.e., where communication links and processes are...
Mouna Allani, Benoît Garbinato, Fernando Ped...
BIRTHDAY
2009
Springer
13 years 6 months ago
Management of UML Clusters
Abstract. Software engineering uses UML diagrams as a standard technique for specification and development of software. Various UML diagrams are used for specification of different...
Peggy Schmidt, Bernhard Thalheim
CDC
2010
IEEE
102views Control Systems» more  CDC 2010»
13 years 3 months ago
Stock market trading via stochastic network optimization
We consider the problem of dynamic buying and selling of shares from a collection of N stocks with random price fluctuations. To limit investment risk, we place an upper bound on t...
Michael J. Neely