Sciweavers

13841 search results - page 2445 / 2769
» Algorithms and Constraint Programming
Sort
View
131
Voted
INFORMATICALT
2007
111views more  INFORMATICALT 2007»
15 years 4 months ago
Oblique Support Vector Machines
In this paper we propose a modified framework of support vector machines, called Oblique Support Vector Machines(OSVMs), to improve the capability of classification. The principl...
Chih-Chia Yao, Pao-Ta Yu
ISI
2007
Springer
15 years 4 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
TMC
2008
136views more  TMC 2008»
15 years 4 months ago
Efficient Resource Allocation for Wireless Multicast
In this paper, we propose a bandwidth-efficient multicast mechanism for heterogeneous wireless networks. We reduce the bandwidth cost of an Internet Protocol (IP) multicast tree by...
De-Nian Yang, Ming-Syan Chen
141
Voted
TPDS
2008
92views more  TPDS 2008»
15 years 4 months ago
Topology Design of Network-Coding-Based Multicast Networks
It is anticipated that a large amount of multicast traffic needs to be supported in future communication networks. The network coding technique proposed recently is promising for e...
Kaikai Chi, Xiaohong Jiang, Susumu Horiguchi, Miny...
JSS
2007
120views more  JSS 2007»
15 years 4 months ago
The design and evaluation of path matching schemes on compressed control flow traces
A control flow trace captures the complete sequence of dynamically executed basic blocks and function calls. It is usually of very large size and therefore commonly stored in com...
Yongjing Lin, Youtao Zhang, Rajiv Gupta
« Prev « First page 2445 / 2769 Last » Next »