Results 1 - 10
of
9,362
Loopy belief propagation for approximate inference: An empirical study. In:
- Proceedings of Uncertainty in AI,
, 1999
"... Abstract Recently, researchers have demonstrated that "loopy belief propagation" -the use of Pearl's polytree algorithm in a Bayesian network with loops -can perform well in the context of error-correcting codes. The most dramatic instance of this is the near Shannon-limit performanc ..."
Abstract
-
Cited by 676 (15 self)
- Add to MetaCart
to the correct marginals. However, on the QMR network, the loopy be liefs oscillated and had no obvious relation ship to the correct posteriors. We present some initial investigations into the cause of these oscillations, and show that some sim ple methods of preventing them lead to the wrong results
Serendipitous Crime Prevention: Success in the Private Sector
"... A serendipitous event is a fortunate by-product of some other activity. Therefore, serendipitous crime prevention occurs when actions that are primarily directed towards one area of crime prevention result in reductions in other areas of crime. This was the case with the problems of vandalism of, an ..."
Abstract
- Add to MetaCart
A serendipitous event is a fortunate by-product of some other activity. Therefore, serendipitous crime prevention occurs when actions that are primarily directed towards one area of crime prevention result in reductions in other areas of crime. This was the case with the problems of vandalism of
Eliminating receive livelock in an interrupt-driven kernel
- ACM Transactions on Computer Systems
, 1997
"... Most operating systems use interface interrupts to schedule network tasks. Interrupt-driven systems can provide low overhead and good latency at low of-fered load, but degrade significantly at higher arrival rates unless care is taken to prevent several pathologies. These are various forms of receiv ..."
Abstract
-
Cited by 322 (5 self)
- Add to MetaCart
Most operating systems use interface interrupts to schedule network tasks. Interrupt-driven systems can provide low overhead and good latency at low of-fered load, but degrade significantly at higher arrival rates unless care is taken to prevent several pathologies. These are various forms
Promoting prevention success at the bargaining table: Regulatory focus in distributive negotiations
"... Article history: Available online xxxx JEL classification: C78 C91 PsycINFO classification: 2360 3020 Keywords: Regulatory focus Promotion Prevention Self-regulation Negotiation Buyer Seller a b s t r a c t While promotion-focused individuals conceptualize goals as ideals and opportunities, prevent ..."
Abstract
- Add to MetaCart
Article history: Available online xxxx JEL classification: C78 C91 PsycINFO classification: 2360 3020 Keywords: Regulatory focus Promotion Prevention Self-regulation Negotiation Buyer Seller a b s t r a c t While promotion-focused individuals conceptualize goals as ideals and opportunities
Preventing Success Being Seen as Failure – The Need for a Systems Approach in IT Development
"... This paper describes two IT development case studies. The first involves a large administrative system for the UK military, the second is a medium-sized information system used by Rolls-Royce. In the first case study a commercial outsourcing company was commissioned to produce the administrative sys ..."
Abstract
- Add to MetaCart
system. They delivered the working product on budget and close to schedule and, therefore, claimed a complete success. However, research showed the users had a very negative attitude, blaming the system for an increased workload and for causing widespread disruption because of its perceived failures. A
Uganda’s HIV prevention success: The role of sexual behavior change and the national response
- AIDS and Behavior
, 2006
"... There has been considerable interest in understanding what may have led to Uganda’s dramatic decline in HIV prevalence, one of the world’s earliest and most compelling AIDS prevention successes. Survey and other data suggest that a decline in multi-partner sexual behavior is the behavioral change mo ..."
Abstract
-
Cited by 14 (0 self)
- Add to MetaCart
There has been considerable interest in understanding what may have led to Uganda’s dramatic decline in HIV prevalence, one of the world’s earliest and most compelling AIDS prevention successes. Survey and other data suggest that a decline in multi-partner sexual behavior is the behavioral change
The Bits and Flops of the N-hop Multilateration Primitive For Node Localization Problems
, 2002
"... The recent advances in MEMS, embedded systems and wireless communication technologies are making the realization and deployment of networked wireless microsensors a tangible task. Vital to the success of wireless microsensor networks is the ability of microsensors to "collectively perform sensi ..."
Abstract
-
Cited by 280 (2 self)
- Add to MetaCart
The recent advances in MEMS, embedded systems and wireless communication technologies are making the realization and deployment of networked wireless microsensors a tangible task. Vital to the success of wireless microsensor networks is the ability of microsensors to "collectively perform
Steering column locks and motor vehicle theft: Evaluations from three countries. Situational crime prevention: Successful case studies
, 1997
"... Abstract: The fitting of security devices to motor vehicles has become an important approach to the prevention of motor vehicle crime. In cars, manu-facturers have focused primarily on improving perimeter security to prevent breaking-in to the vehicle, and installing devices to prevent parked vehicl ..."
Abstract
-
Cited by 14 (0 self)
- Add to MetaCart
Abstract: The fitting of security devices to motor vehicles has become an important approach to the prevention of motor vehicle crime. In cars, manu-facturers have focused primarily on improving perimeter security to prevent breaking-in to the vehicle, and installing devices to prevent parked
SOS: Secure overlay services
- In Proceedings of ACM SIGCOMM
, 2002
"... angelos,misra,danr¥ Denial of service (DoS) attacks continue to threaten the reliability of networking systems. Previous approaches for protecting networks from DoS attacks are reactive in that they wait for an attack to be launched before taking appropriate measures to protect the network. This lea ..."
Abstract
-
Cited by 253 (15 self)
- Add to MetaCart
. This leaves the door open for other attacks that use more sophisticated methods to mask their traffic. We propose an architecture called Secure Overlay Services (SOS) that proactively prevents DoS attacks, geared toward supporting Emergency Services or similar types of communication. The architecture
An effective on-chip preloading scheme to reduce data access penalty
- In Proceedings of the 1991 ACM/IEEE conference on Supercomputing, Supercomputing ’91
, 1991
"... Conventional cache prefetching approaches can be either hardware-based, generally by using a one-block-Iookahead technique, or compiler-directed, with inser-tions of non-blocking prefetch instructions. We intro-duce a new hardware scheme based on the prediction of the execution of the instruction st ..."
Abstract
-
Cited by 255 (4 self)
- Add to MetaCart
is prevented. We evaluate our design through trace driven simulation by comparing it with a pure data cache approach under three different memory ac-cess models. Our experiments show that this scheme is very effective for reducing the data access penalty for scientific programs and that is has moderate success
Results 1 - 10
of
9,362