Sciweavers

7129 search results - page 1127 / 1426
» Approximation Algorithms for Treewidth
Sort
View
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
15 years 7 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
151
Voted
TACAS
1998
Springer
98views Algorithms» more  TACAS 1998»
15 years 7 months ago
Efficient Modeling of Memory Arrays in Symbolic Ternary Simulation
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic variable...
Miroslav N. Velev, Randal E. Bryant
122
Voted
IPPS
1997
IEEE
15 years 7 months ago
Performance Analysis and Optimization on a Parallel Atmospheric General Circulation Model Code
An analysis is presented of the primary factors influencing the performance of a parallel implementation of the UCLA atmospheric general circulation model (AGCM) on distributedme...
John Z. Lou, John D. Farrara
163
Voted
IPPS
1996
IEEE
15 years 7 months ago
The Chessboard Distance Transform and the Medial Axis Transform are Interchangeable
The distance transform (DT) and the medial axis transform (MAT) are two image computation tools used to extract the information about the shape and the position of the foreground ...
Yu-Hua Lee, Shi-Jinn Horng
129
Voted
ECML
1993
Springer
15 years 7 months ago
Complexity Dimensions and Learnability
In machine learning theory, problem classes are distinguished because of di erences in complexity. In 6 , a stochastic model of learning from examples was introduced. This PAClear...
Shan-Hwei Nienhuys-Cheng, Mark Polman
« Prev « First page 1127 / 1426 Last » Next »