Sciweavers

3360 search results - page 593 / 672
» An Optimal Distributed Edge-Biconnectivity Algorithm
Sort
View
166
Voted
GECCO
2009
Springer
258views Optimization» more  GECCO 2009»
15 years 7 months ago
Evolutionary learning of local descriptor operators for object recognition
Nowadays, object recognition is widely studied under the paradigm of matching local features. This work describes a genetic programming methodology that synthesizes mathematical e...
Cynthia B. Pérez, Gustavo Olague
111
Voted
VLDB
1998
ACM
136views Database» more  VLDB 1998»
15 years 6 months ago
Materialized View Selection for Multidimensional Datasets
To fulfill the requirement of fast interactive multidimensional data analysis, database systems precompute aggregate views on some subsets of dimensions and their corresponding hi...
Amit Shukla, Prasad Deshpande, Jeffrey F. Naughton
128
Voted
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
16 years 3 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
GECCO
2009
Springer
146views Optimization» more  GECCO 2009»
15 years 9 months ago
Analyzing the landscape of a graph based hyper-heuristic for timetabling problems
Hyper-heuristics can be thought of as “heuristics to choose heuristics”. They are concerned with adaptively finding solution methods, rather than directly producing a solutio...
Gabriela Ochoa, Rong Qu, Edmund K. Burke
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 9 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...