Sciweavers

1702 search results - page 273 / 341
» Using Nondeterminism to Design Efficient Deterministic Algor...
Sort
View
SODA
2000
ACM
123views Algorithms» more  SODA 2000»
13 years 10 months ago
Communication complexity of document exchange
We address the problem of minimizing the communication involved in the exchange of similar documents. We consider two users, A and B, who hold documents x and y respectively. Neit...
Graham Cormode, Mike Paterson, Süleyman Cenk ...
WSC
2000
13 years 10 months ago
Variance reduction techniques for value-at-risk with heavy-tailed risk factors
The calculation of value-at-risk (VAR) for large portfolios of complex instruments is among the most demanding and widespread computational challenges facing the financial industr...
Paul Glasserman, Philip Heidelberger, Perwez Shaha...
IJIPT
2010
147views more  IJIPT 2010»
13 years 7 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
TEC
2010
77views more  TEC 2010»
13 years 3 months ago
On Set-Based Multiobjective Optimization
Abstract--Assuming that evolutionary multiobjective optimization (EMO) mainly deals with set problems, one can identify three core questions in this area of research: (i) how to fo...
Eckart Zitzler, Lothar Thiele, Johannes Bader
JMM2
2007
120views more  JMM2 2007»
13 years 8 months ago
A Rate Estimation Framework for Matching Pursuits Video Coding
— The Bath University Matching Pursuit (BUMP) project aims at developing new matching pursuit (MP) algorithms for still image and video compression. Compared to traditional MP co...
Haoxiang Zhang, Adrian N. Evans, Donald M. Monro