Sciweavers

1221 search results - page 140 / 245
» A Comparison of Two Programming Models for Pervasive Computi...
Sort
View
157
Voted
ML
2000
ACM
244views Machine Learning» more  ML 2000»
15 years 3 months ago
Learnable Evolution Model: Evolutionary Processes Guided by Machine Learning
A new class of evolutionary computation processes is presented, called Learnable Evolution Model or LEM. In contrast to Darwinian-type evolution that relies on mutation, recombinat...
Ryszard S. Michalski
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
15 years 7 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
134
Voted
ASPDAC
2000
ACM
159views Hardware» more  ASPDAC 2000»
15 years 8 months ago
Analytical minimization of half-perimeter wirelength
Global placement of hypergraphs is critical in the top-down placement of large timing-driven designs 10, 16 . Placement quality is evaluated in terms of the half-perimeter wirelen...
Andrew A. Kennings, Igor L. Markov
ASPLOS
1996
ACM
15 years 7 months ago
An Integrated Compile-Time/Run-Time Software Distributed Shared Memory System
On a distributed memory machine, hand-coded message passing leads to the most efficient execution, but it is difficult to use. Parallelizing compilers can approach the performance...
Sandhya Dwarkadas, Alan L. Cox, Willy Zwaenepoel
118
Voted
EICS
2009
ACM
15 years 10 months ago
A bisimulation-based approach to the analysis of human-computer interaction
This paper discusses the use of formal methods for analysing human-computer interaction. We focus on the mode confusion problem that arises whenever the user thinks that the syste...
Sébastien Combéfis, Charles Pecheur