Sciweavers

7167 search results - page 1059 / 1434
» Answer Set Programming
Sort
View
143
Voted
ICMLA
2003
15 years 4 months ago
Robust Support Vector Machines for Anomaly Detection in Computer Security
— Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared...
Wenjie Hu, Yihua Liao, V. Rao Vemuri
SODA
2001
ACM
157views Algorithms» more  SODA 2001»
15 years 4 months ago
New approaches to covering and packing problems
Covering and packing integer programs model a large family of combinatorial optimization problems. The current-best approximation algorithms for these are an instance of the basic...
Aravind Srinivasan
WOA
2001
15 years 4 months ago
Coordinating Mobile Agents by means of Communicators
This paper proposes a coordination model, for both nd mobile agents, based on abstract structures called Communicators, entities which handle agent dialogue performed through ACL ...
Antonella Di Stefano, Corrado Santoro
WSC
2001
15 years 4 months ago
Simulation and analysis of dealers' returns distribution strategy
Due to high demand uncertainty, excess inventory has been a key issue in inventory control. Caterpillar developed the dealers' parts inventory sharing (DPIS) and returns prog...
Hui Zhao
124
Voted
DS
1997
97views Database» more  DS 1997»
15 years 4 months ago
A Formalization of ODMG Queries
The ODMG proposal has helped to focus the work on object-oriented databases (OODBs) onto a common object model and query language. Nevertheless there are several shortcomings of t...
Holger Riedel, Marc H. Scholl
« Prev « First page 1059 / 1434 Last » Next »