Sciweavers

2517 search results - page 262 / 504
» The Fairness Challenge in Computer Networks
Sort
View
GI
2001
Springer
15 years 9 months ago
Personal Information Agent
Abstract: Information overflow is one of the greatest challenges for information focused professions today. This paper presents the Personal Information Agent, an agent based info...
Dominik Kuropka, Thomas Serries
PERCOM
2004
ACM
16 years 4 months ago
Untraceable Secret Credentials: Trust Establishment with Privacy
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
Laurent Bussard, Yves Roudier, Refik Molva
ICALP
2009
Springer
16 years 5 months ago
Learning Halfspaces with Malicious Noise
We give new algorithms for learning halfspaces in the challenging malicious noise model, where an adversary may corrupt both the labels and the underlying distribution of examples....
Adam R. Klivans, Philip M. Long, Rocco A. Servedio
GECCO
2007
Springer
179views Optimization» more  GECCO 2007»
15 years 11 months ago
The second harmonic generation case-study as a gateway for es to quantum control problems
The Second Harmonic Generation (SHG), a process that turns out to be a good test case in the physics lab, can also be considered as a fairly simple theoretical test function for g...
Ofer M. Shir, Thomas Bäck
CASES
2007
ACM
15 years 8 months ago
Rethinking custom ISE identification: a new processor-agnostic method
The last decade has witnessed the emergence of the Application Specific Instruction-set Processor (ASIP) as a viable platform for embedded systems. Extensible ASIPs allow the user...
Ajay K. Verma, Philip Brisk, Paolo Ienne