Sciweavers

949 search results - page 2 / 190
» ISAC - Instance-Specific Algorithm Configuration
Sort
View
ADMA
2010
Springer
314views Data Mining» more  ADMA 2010»
13 years 2 months ago
Best Clustering Configuration Metrics: Towards Multiagent Based Clustering
Multi-Agent Clustering (MAC) requires a mechanism for identifying the most appropriate cluster configuration. This paper reports on experiments conducted with respect to a number o...
Santhana Chaimontree, Katie Atkinson, Frans Coenen
CORR
2002
Springer
118views Education» more  CORR 2002»
13 years 4 months ago
Instabilities of Robot Motion
Instabilities of robot motion are caused by topological reasons. In this paper we find a relation between the topological properties of a configuration space (the structure of its...
Michael Farber
ICASSP
2009
IEEE
13 years 2 months ago
Tree configuration games for distributed stream mining systems
We consider the problem of configuring classifier trees in distributed stream mining system. The configuration involves selecting appropriate false-alarm detection tradeoffs for e...
Hyunggon Park, Deepak S. Turaga, Olivier Verscheur...
CNSM
2010
13 years 2 months ago
Automated and secure IPv6 configuration in enterprise networks
Over the last decade, IPv6 has established itself as the most mature network protocol for the future Internet. Its recent deployment in core networks of operators, its availability...
Frederic Beck, Olivier Festor, Isabelle Chrisment,...
JHSN
2000
112views more  JHSN 2000»
13 years 4 months ago
A hierarchical Quality of Service control architecture for configurable multimedia applications
In order to achieve the best application-level Quality-of-Service (QoS), multimedia applications need to be dynamically tuned and reconfigured to adapt to fluctuating computing an...
Baochun Li, William Kalter, Klara Nahrstedt