Sciweavers

1690 search results - page 24 / 338
» Algorithmic Properties of Millstream Systems
Sort
View
111
Voted
WEBI
2005
Springer
15 years 9 months ago
Network-Based Intrusion Detection Using Adaboost Algorithm
Intrusion detection on the internet is a heated research field in computer science, where much work has been done during the past two decades. In this paper, we build a network-b...
Wei Hu, Weiming Hu
140
Voted
CDC
2010
IEEE
182views Control Systems» more  CDC 2010»
14 years 10 months ago
An approximate dual subgradient algorithm for multi-agent non-convex optimization
We consider a multi-agent optimization problem where agents aim to cooperatively minimize a sum of local objective functions subject to a global inequality constraint and a global ...
Minghui Zhu, Sonia Martínez
140
Voted
CDC
2008
IEEE
150views Control Systems» more  CDC 2008»
15 years 10 months ago
Subgradient methods and consensus algorithms for solving convex optimization problems
— In this paper we propose a subgradient method for solving coupled optimization problems in a distributed way given restrictions on the communication topology. The iterative pro...
Björn Johansson, Tamás Keviczky, Mikae...
ADBIS
2005
Springer
140views Database» more  ADBIS 2005»
15 years 9 months ago
D-ARIES: A Distributed Version of the ARIES Recovery Algorithm
Abstract. This paper presents an adaptation of the ARIES recovery algorithm that solves the problem of recovery in Shared Disk (SD) database systems, whilst preserving all the desi...
Jayson Speer, Markus Kirchberg
148
Voted
KDD
2006
ACM
200views Data Mining» more  KDD 2006»
16 years 4 months ago
A Random-Walk Based Scoring Algorithm Applied to Recommender Engines
Recommender systems are an emerging technology that helps consumers find interesting products and useful resources. A recommender system makes personalized product suggestions by e...
Augusto Pucci, Marco Gori, Marco Maggini