Sciweavers

351 search results - page 53 / 71
» The Aggregation of Imprecise Probabilities
Sort
View
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 6 months ago
An Upper Bound on Multi-hop Transmission Capacity with Dynamic Multipath Routing
This paper develops upper bounds on the end-to-end transmission capacity of multi-hop wireless networks. Potential source-destination paths are dynamically selected from a pool of...
Yuxin Chen, Jeffrey Andrews
ICDM
2010
IEEE
235views Data Mining» more  ICDM 2010»
13 years 4 months ago
Content-Based Methods for Predicting Web-Site Demographic Attributes
Demographic information plays an important role in gaining valuable insights about a web-site's user-base and is used extensively to target online advertisements and promotion...
Santosh Kabbur, Eui-Hong Han, George Karypis
ATAL
2009
Springer
14 years 2 months ago
Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties
How do we build multiagent algorithms for agent interactions with human adversaries? Stackelberg games are natural models for many important applications that involve human intera...
James Pita, Manish Jain, Fernando Ordó&ntil...
SIGMETRICS
2006
ACM
14 years 1 months ago
Robust network connectivity: when it's the big picture that matters
This work analyzes the connectivity of large diameter networks where every link has an independent probability p of failure. We give a (relatively simple) topological condition th...
Enoch Peserico, Larry Rudolph
CSREASAM
2006
13 years 8 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin