Sciweavers

343 search results - page 51 / 69
» Social Learning Applications in Resource Constrained Network...
Sort
View
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 2 months ago
On the Combinatorial Multi-Armed Bandit Problem with Markovian Rewards
We consider a combinatorial generalization of the classical multi-armed bandit problem that is defined as follows. There is a given bipartite graph of M users and N M resources. F...
Yi Gai, Bhaskar Krishnamachari, Mingyan Liu
KSEM
2009
Springer
14 years 2 months ago
Knowledge Maturing Services: Supporting Knowledge Maturing in Organisational Environments
The changes in the dynamics of the economy and the corresponding mobility and fluctuations of knowledge workers within organizations make continuous social learning an essential f...
Karin Schoefegger, Nicolas Weber, Stefanie N. Lind...
INFOCOM
2009
IEEE
14 years 2 months ago
P2P Second Life: Experimental Validation Using Kad
: Applications such as Second Life require massive deployment of servers worldwide to support a large number of users. We investigate experimentally how Peer-to-Peer (P2P) communic...
Matteo Varvello, C. Diout, Ernst W. Biersack
CMS
2010
207views Communications» more  CMS 2010»
13 years 7 months ago
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
While conventional malware detection approaches increasingly fail, modern heuristic strategies often perform dynamically, which is not possible in many applications due to related ...
Ronny Merkel, Tobias Hoppe, Christian Krätzer...
WIMOB
2008
IEEE
14 years 1 months ago
An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Raheleh B. Dilmaghani, Ramesh R. Rao