Sciweavers

1612 search results - page 242 / 323
» A relational approach to software metrics
Sort
View
ML
2010
ACM
119views Machine Learning» more  ML 2010»
14 years 8 months ago
A cooperative coevolutionary algorithm for instance selection for instance-based learning
This paper presents a cooperative evolutionary approach for the problem of instance selection for instance based learning. The presented model takes advantage of one of the most r...
Nicolás García-Pedrajas, Juan Antoni...
TON
2010
300views more  TON 2010»
14 years 8 months ago
POPI: a user-level tool for inferring router packet forwarding priority
— Packet forwarding prioritization (PFP) in routers is one of the mechanisms commonly available to network operators. PFP can have a significant impact on the accuracy of networ...
Guohan Lu, Yan Chen, Stefan Birrer, Fabián ...
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
15 years 11 months ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang
GRAPHITE
2005
ACM
15 years 3 months ago
Uniting cartoon textures with computer assisted animation
We present a novel method to create perpetual animations from a small set of given keyframes. Existing approaches either are limited to re-sequencing large amounts of existing ima...
William Van Haevre, Fabian Di Fiore, Frank Van Ree...
ESAS
2004
Springer
15 years 3 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar