Sciweavers

1791 search results - page 274 / 359
» Behavioral Operations
Sort
View
FSS
2007
102views more  FSS 2007»
15 years 3 months ago
Extraction of fuzzy rules from support vector machines
The relationship between support vector machines (SVMs) and Takagi–Sugeno–Kang (TSK) fuzzy systems is shown. An exact representation of SVMs as TSK fuzzy systems is given for ...
Juan Luis Castro, L. D. Flores-Hidalgo, Carlos Jav...
PE
2006
Springer
130views Optimization» more  PE 2006»
15 years 3 months ago
Analysis of resource transfers in peer-to-peer file sharing applications using fluid models
This paper proposes a stochastic fluid flow model to compute the transfer time distribution of resources in peer-to-peer file sharing applications. The amount of bytes transferred...
Rossano Gaeta, Marco Gribaudo, Daniele Manini, Mat...
PERVASIVE
2006
Springer
15 years 3 months ago
Scalability in a Secure Distributed Proof System
Abstract. A logic-based language is often adopted in systems for pervasive computing, because it provides a convenient way to define rules that change the behavior of the systems d...
Kazuhiro Minami, David Kotz
SIAMSC
2008
104views more  SIAMSC 2008»
15 years 3 months ago
Reducing Floating Point Error in Dot Product Using the Superblock Family of Algorithms
This paper discusses both the theoretical and statistical errors obtained by various well-known dot products, from the canonical to pairwise algorithms, and introduces a new and mo...
Anthony M. Castaldo, R. Clint Whaley, Anthony T. C...
SIGMETRICS
2008
ACM
15 years 3 months ago
Managing inter-domain traffic in the presence of bittorrent file-sharing
Overlay routing operating in a selfish manner is known to cause undesired instability when it interacts with native layer routing. We observe similar selfish behavior with the Bit...
Srinivasan Seetharaman, Mostafa H. Ammar