Sciweavers

1810 search results - page 164 / 362
» Similarity estimation techniques from rounding algorithms
Sort
View
AUTONOMICS
2009
ACM
14 years 2 months ago
Sensor Selection for IT Infrastructure Monitoring
Supervisory control is the main means to assure a high level performance and availability of large IT infrastructures. Applied control theory is used in physical and virtualization...
Gergely János Paljak, Imre Kocsis, Zolt&aac...
ICDIM
2010
IEEE
13 years 6 months ago
Social network collaborative filtering framework and online trust factors: A case study on Facebook
Recommender systems have been proposed to exploit the potential of social network by filtering the information and offer recommendations to a user that he is predicted to like. Co...
Wei Chen, Simon Fong
AAAI
2010
13 years 9 months ago
Bayesian Policy Search for Multi-Agent Role Discovery
Bayesian inference is an appealing approach for leveraging prior knowledge in reinforcement learning (RL). In this paper we describe an algorithm for discovering different classes...
Aaron Wilson, Alan Fern, Prasad Tadepalli
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
13 years 8 months ago
Compromising Reflections-or-How to Read LCD Monitors around the Corner
We present a novel eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors. Our ...
Michael Backes, Markus Dürmuth, Dominique Unr...
ICPR
2006
IEEE
14 years 9 months ago
Part-Based Probabilistic Point Matching
Correspondence algorithms typically struggle with shapes that display part-based variation. We present a probabilistic approach that matches shapes using independent part transfor...
Graham McNeill, Sethu Vijayakumar