Results 11 - 20
of
1,137
Autonomous Nodes and Distributed Mechanisms
- In Software Security - Theories and Systems. Mext-NSF-JSPS International Symposium (ISSS 2002
, 2003
"... We extend distributed algorithmic mechanism design by considering a new model that allows autonomous nodes executing a distributed mechanism to strategically deviate from the prescribed protocol. Our goal is to motivate agents to contribute to a global objective and resist disruption by a limited nu ..."
Abstract
-
Cited by 6 (1 self)
- Add to MetaCart
We extend distributed algorithmic mechanism design by considering a new model that allows autonomous nodes executing a distributed mechanism to strategically deviate from the prescribed protocol. Our goal is to motivate agents to contribute to a global objective and resist disruption by a limited
Large Margin Boltzmann Machines ∗
"... Boltzmann Machines are a powerful class of undirected graphical models. Originally proposed as artificial neural networks, they can be regarded as a type of Markov Random Field in which the connection weights between nodes are symmetric and learned from data. They are also closely related to recent ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Boltzmann Machines are a powerful class of undirected graphical models. Originally proposed as artificial neural networks, they can be regarded as a type of Markov Random Field in which the connection weights between nodes are symmetric and learned from data. They are also closely related to recent
Global Intrusion Detection in the DOMINO Overlay System
- In Proceedings of Network and Distributed System Security Symposium (NDSS
, 2004
"... Sharing data between widely distributed intrusion detection systems offers the possibility of significant improvements in speed and accuracy over isolated systems. In this paper, we describe and evaluate DOMINO (Distributed Overlay for Monitoring InterNet Outbreaks); an architecture for a distribute ..."
Abstract
-
Cited by 127 (4 self)
- Add to MetaCart
distributed intrusion detection system that fosters collaboration among heterogeneous nodes organized as an overlay network. The overlay design enables DOMINO to be heterogeneous, scalable, and robust to attacks and failures. An important component of DOMINO’s design is the use of active sink nodes which
Measuring uncertainty in graph cut solutions - efficiently computing min-marginal energies using dynamic graph cuts
- In ECCV
, 2006
"... Abstract. In recent years the use of graph-cuts has become quite popular in computer vision. However, researchers have repeatedly asked the question whether it might be possible to compute a measure of uncertainty associated with the graphcut solutions. In this paper we answer this particular questi ..."
Abstract
-
Cited by 66 (9 self)
- Add to MetaCart
assignment, and the flow potentials of the node representing that variable in the graph used in the energy minimization procedure. We then proceed to show how the min-marginal energy can be computed by minimizing a projection of the energy function defined by the MRF. We propose a fast and novel algorithm
Large Margin Trees for Induction and Transduction
, 1999
"... The problem of controlling the capacity of decision trees is considered for the case where the decision nodes implement linear threshold functions. In addition to the standard early stopping and pruning procedures, we implement a strategy based on the margins of the decision boundaries at the ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
The problem of controlling the capacity of decision trees is considered for the case where the decision nodes implement linear threshold functions. In addition to the standard early stopping and pruning procedures, we implement a strategy based on the margins of the decision boundaries
UPPER BOUND FOR THE DECAY RATE OF THE MARGINAL QUEUE-LENGTH DISTRIBUTION IN A TWO-NODE MARKOVIAN QUEUEING SYSTEM
, 2003
"... Abstract We study a geometric decay property for two-node queueing networks, not restricted to ones having acyclic configuration. We take a matrix-analytic approach, and prove the geometric decay property of the marginal queue-length distributions by giving an upper bound of the exact decay rate for ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract We study a geometric decay property for two-node queueing networks, not restricted to ones having acyclic configuration. We take a matrix-analytic approach, and prove the geometric decay property of the marginal queue-length distributions by giving an upper bound of the exact decay rate
Automated Analytic Asymptotic Evaluation of the Marginal
- Proceedings of the Nineteenth Annual Conference on Uncertainty in Artificial Intelligence (UAI-03
, 2003
"... We present two algorithms for analytic asymptotic evaluation of the marginal likelihood of data given a Bayesian network with hidden nodes. As shown by previous work, this evaluation is particularly hard because for these models asymptotic approximation of the marginal likelihood deviates from ..."
Abstract
- Add to MetaCart
We present two algorithms for analytic asymptotic evaluation of the marginal likelihood of data given a Bayesian network with hidden nodes. As shown by previous work, this evaluation is particularly hard because for these models asymptotic approximation of the marginal likelihood deviates
Predictive Value of Positive Surgical Margins after Radical Prostatectomy for Lymph Node Metastasis in Locally Advanced Prostate Carcinoma
"... Introduction. Suspected locally advanced prostate carcinoma shows lymph node involvement in a high percentage of cases. For a long time, such patients were not radically prostatectomised. In recent years, however, this viewpoint has changed. Material and Methods. We analysed a single-centre series ..."
Abstract
- Add to MetaCart
level was 25 ng/mL, and five patients had had neoadjuvant antihormonal treatment. Positive margins were found in 76% of patients. Patients without neoadjuvant treatment showed it in 79%, and after preoperative antihormonal treatment the rate was 60%. Positive margins were associated with lymph node
Surgical Management of Primary Cutaneous Melanoma: Excision Margins and the Role of Sentinel Lymph Node Examination
"... Thirty years ago, most melanomas were widely excised with 3-cm to 5-cm margins, and many centers treated regional lymph nodes with routine elective lymph node dissection (ELND). These management policies were not evidence-based, they simply represented a continuation of surgical practices that had b ..."
Abstract
- Add to MetaCart
Thirty years ago, most melanomas were widely excised with 3-cm to 5-cm margins, and many centers treated regional lymph nodes with routine elective lymph node dissection (ELND). These management policies were not evidence-based, they simply represented a continuation of surgical practices that had
Themany faces of marginal zone lymphoma
"... Indolent B-cell lymphomas that are supposed to derive from the marginal zone (marginal zone lymphomas [MZLs]) include 3 specific entities: extranodal marginal zone lymphoma (EMZL) or mucosa-associated lymphatic tissue (MALT) lymphoma, splenic MZL (SMZL), and nodal MZL (NMZL). The clinical andmolecul ..."
Abstract
- Add to MetaCart
Indolent B-cell lymphomas that are supposed to derive from the marginal zone (marginal zone lymphomas [MZLs]) include 3 specific entities: extranodal marginal zone lymphoma (EMZL) or mucosa-associated lymphatic tissue (MALT) lymphoma, splenic MZL (SMZL), and nodal MZL (NMZL). The clinical
Results 11 - 20
of
1,137